Cyber Security Roundup for August 2019

Twitter boss, Jack Doresy, had his Twitter account was hacked at the end of August, with hackers using his account to send a stream of offensive messages to his 4.2 million followers ...
The End of CoinHive and the Rise of Cryptojacking

The End of CoinHive and the Rise of Cryptojacking

CoinHive is a service that was created in September 2017. It allows users to mine Monero cryptocurrency using JavaScript. CoinHive has remarkably changed the income models of content developers over the course ...
The Emergence of Geopolitical Fuelled Cyber Attacks

The Emergence of Geopolitical Fuelled Cyber Attacks

A new breed of cyberattack is emerging into the threat landscape, fuelled by geopolitical tension, there has been a rise in stealthy and sophisticated cyber attacks reported within recent industry reports. Carbon ...

Cyber Security Roundup for July 2018

The importance of assuring the security and testing quality of third-party provided applications is more than evident when you consider an NHS reported data breach of 150,000 patient records this month. The ...
Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers are still choosing to automate their homes at an incredible rate. Currently ...
Criminals Hacking CPUs to Mine Cryptocurrencies

Criminals Hacking CPUs to Mine Cryptocurrencies

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing ...

Cyber Security Roundup for February 2018

February saw over 5,000 websites infected by cryptocurrency mining malware after a popular accessibility plugin called ‘BrowseAloud’ was compromised by hackers. This led to several UK Government and Councils websites going offline, ...
New RIG malvertising campaign uses cryptocurrency theme as decoy

New RIG malvertising campaign uses cryptocurrency theme as decoy

This malvertising campaign uses a popular cryptocurrency theme to redirect users to the RIG exploit kit. Categories: Exploits Threat analysis Tags: cryptocurrenciesmalvertisingRIGRIGEK (Read more...) The post New RIG malvertising campaign uses cryptocurrency ...