Creator of cryptocurrency miner Coinhive reveals his identity

Creator of cryptocurrency miner Coinhive reveals his identity

“Monetize your business with your users’ CPU power.” That’s the alluring promise to make a fortune overnight through crypto-mining, the practice of using computing power to generate cryptocurrency – digital money that ...
Malicious cryptomining and the blacklist conundrum

Malicious cryptomining and the blacklist conundrum

When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult. Categories: Cryptomining Threat analysis Tags: adblockersblacklistcoinhivecryptominerscryptominingGitHub (Read more...) The post Malicious cryptomining ...
The state of malicious cryptomining

The state of malicious cryptomining

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats. Categories: ...
Deepfakes FakeApp tool (briefly) includes cryptominer

Deepfakes FakeApp tool (briefly) includes cryptominer

We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn't end well. Categories: Security ...
Another Cloud Storage Leak Exposes Verizon IT Files

Another Cloud Storage Leak Exposes Verizon IT Files

Security researchers have found yet another Amazon S3 storage container with sensitive data that was publicly accessible to anyone on the internet. The S3 bucket contained around 100MB of data, including internal ...
Loading...