Blockchain & Digital Currencies

Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it’s impact on the Cybersecurity Community.

146 Billion Records Leaked by 2023, Small Businesses Left Most Vulnerable, Study Says

Enterprises are at risk now more than ever because it seems they keep falling behind on infrastructure security, while hackers are more vigilant and sophisticated in their schemes. Researchers can’t really put ...
An example of a successful account takeover attack using Hydra, a credential stuffing tool

Watch: An Account Takeover Attack Using Credential Stuffing, and How to Protect Against It [Video]

As cryptocurrencies continue to grow in diversity, so too do the threats they face, specifically those targeting the cryptocurrency exchange. Now, more than ever, cryptocurrency exchanges are facing security threats in the ...
Malicious Cryptocurrency Mining: The Road Ahead

Malicious Cryptocurrency Mining: The Road Ahead

As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still doing their best to make the most out of their resources to ...
No cryptocurrency exchange can fully guarantee security, researchers say

No cryptocurrency exchange can fully guarantee security, researchers say

2017 saw many risk-takers rack up small fortunes by riding the Bitcoin wave, but some ended up in tears — their accounts hacked and their crypto-wallets emptied. While you might be tempted ...
Raising the Bar for Ethical Cryptocurrency Mining

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will continue the discussion, explain what ethical mining is ...

A week in security (July 30 – August 5)

A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more. Categories: Security world Week in security Tags: big databreachcryptominingfacebookmalwarerecapredditSocial Engineeringspamsteam cryptominerweekly blog ...

A game that cryptojacks, a town under seige, and more data breaches | Avast

Steam game found to be secretly cryptomining “Malicious cryptomining has become so popular among cybercriminals that it has earned its own name: cryptojacking,” states Avast security evangelist Luis Corrons. “It is one ...
Clever cryptojacking campaign targets MicroTik routers. If you own one, patch now!

Clever cryptojacking campaign targets MicroTik routers. If you own one, patch now!

Hackers are conducting several malware campaigns involving cryptojacking tools and vulnerable MikroTik routers. Their clever technique eliminates the need to infect websites with cryptojacking malware, and instead shifts the focus onto unpatched ...
Steam Alert: Abstractism Game Exploited Gamers’ CPU for Cryptomining

Steam Alert: Abstractism Game Exploited Gamers’ CPU for Cryptomining

Numerous Steam users have reported that a game titled Abstractism is consuming way too much CPU power to mine for cryptocurrency. The game was also selling marketplace items that were masqueraded as ...
Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

By the end of the last year, we saw a drastic rise in drive-by cryptocurrency mining activities and it is quite alarming to note that cyber-criminals are getting smarter and smarter day-by-day ...
Loading...