python-dateutils—A Cryptominer in Disguise Targeting Windows, Linux, macOS

You've probably heard of the Python module 'dateutil'. The module offers powerful extensions to the standard datetime library extensively used by Python developers. Yesterday, however, Sonatype's automated malware detection system caught a ...
The Spider Man Virus, Yeah...  People Still Fall for This

Spider-Man: Employees Clicking on Crypto-mining Malware File

| | Axio Insights, crypto mining, Malware
Spider-Man: No Way Home, which debuted in December 2021, is now in its fifth weekend in theaters with over $1.5B in box office sales. Despite being only available in theaters, it is the ...
cryptojacking

Assessing the Dangers Caused by Cryptojacking

Cryptojacking, also known as crypto mining, is an online threat hidden on a computer or a mobile device, using its resources to mine for cryptocurrencies. While doing so, cryptojacking takes over control ...
Security Boulevard
Have Crypto-Miners Infiltrated Your Public Cloud?

Have Crypto-Miners Infiltrated Your Public Cloud?

How do you know if bad actors are siphoning off your power and racking up huge bills for your organization? These silent malware scripts could be infecting your public cloud infrastructure right ...
The Rise in Cryptomining

The Rise in Cryptomining

There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction of attackers are cybercriminals, individuals or well-established organizations looking to turn a ...

Read All About It: The Breaches That Won’t Make the Headlines

It’s been a busy few months for those tracking cybersecurity breaches. Considering that this quarter alone has seen headlines for British Airways identifying additional victims behind its already significant breach, Facebook’s massive ...
Drupal, Phishing and A New Cryptomining Botnet

Drupal, Phishing and A New Cryptomining Botnet

It’s a well-known fact that security solutions must quickly adapt to new attack methods. There are several ways to achieve this goal, regularly applying security patches and updates, relying on threat intelligence ...

A week in security (July 9 – July 15)

A roundup of the security news from July 9 - July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more. Categories: Security world Week in security Tags: ad blockersandroid malwarecrypto ...

A week in security (July 2 – July 8)

A roundup of the security news from July 2 - July 8, including a macro-less infection tecnique, online project management tools and crypto-mining malware campaigns. Categories: Security world Week in security Tags: ...

A week in security (June 11 – June 17)

A roundup of the security news from June 11 – 17, including a look at online privacy for children, an exploit kits update, and how law enforcement is coping with cybercrime. Categories: ...