Have Crypto-Miners Infiltrated Your Public Cloud?

Have Crypto-Miners Infiltrated Your Public Cloud?

How do you know if bad actors are siphoning off your power and racking up huge bills for your organization? These silent malware scripts could be infecting your public cloud infrastructure right ...
The Rise in Cryptomining

The Rise in Cryptomining

There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction of attackers are cybercriminals, individuals or well-established organizations looking to turn a ...

Read All About It: The Breaches That Won’t Make the Headlines

It’s been a busy few months for those tracking cybersecurity breaches. Considering that this quarter alone has seen headlines for British Airways identifying additional victims behind its already significant breach, Facebook’s massive ...
Drupal, Phishing and A New Cryptomining Botnet

Drupal, Phishing and A New Cryptomining Botnet

It’s a well-known fact that security solutions must quickly adapt to new attack methods. There are several ways to achieve this goal, regularly applying security patches and updates, relying on threat intelligence ...

A week in security (July 9 – July 15)

A roundup of the security news from July 9 - July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more. Categories: Security world Week in security Tags: ad blockersandroid malwarecrypto ...

A week in security (July 2 – July 8)

A roundup of the security news from July 2 - July 8, including a macro-less infection tecnique, online project management tools and crypto-mining malware campaigns. Categories: Security world Week in security Tags: ...

A week in security (June 11 – June 17)

A roundup of the security news from June 11 – 17, including a look at online privacy for children, an exploit kits update, and how law enforcement is coping with cybercrime. Categories: ...
Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Individual research contributed by Adi Raff and Yuval Shapira. On May 3, 2018, Radware’s malware protection service detected a zero-day malware threat at one of its customers, a global manufacturing firm, by ...

13th March 2018 resources updates

(1) New section on Trend Micro Resources in Meltdown/Spectre – Related Resources Trend Micro: Detecting Attacks that Exploit Meltdown and Spectre with Performance Counters “We worked on a detection technique for attacks ...

March 5th 2018 resources update

Update to Ransomware Recovery and Prevention For Tripwire, Paul Norris writes about How PCI/DSS Compliance Can Protect Your Systems against New Ransomware Threats. His take on the history of ransomware is a ...
Loading...