cryptomining

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in…

3 months ago

VictoryGate Monero-Mining Botnet Spread via Infected USB Devices

A previously undocumented botnet called “VictoryGate” propagated via infected USB devices in order to perform Monero-mining functionality. Slovakian security firm…

8 months ago

CookieMiner malware targets Macs, steals passwords and SMS messages, mines for cryptocurrency

Mac users can't ignore the need to protect their computers from malware with up-to-date anti-virus software and other security tools.…

1 year ago

Joint Effort Neutralized Over 850K Infections of Retadup Worm

A joint investigatory effort neutralized more than 850,000 unique infections of Retadup, a worm known for targeting Windows machines in…

1 year ago

Browser Push Notifications: Useful Feature Exploited by Deceptive Marketers

Pop-ups and browser lockers have given way to irritating and potentially destructive push notifications For many of us, when we…

1 year ago

Have Crypto-Miners Infiltrated Your Public Cloud?

How do you know if bad actors are siphoning off your power and racking up huge bills for your organization?…

1 year ago

Modular Plurox Backdoor Comes with Cryptomining, Worm-Like Plugins

A new modular backdoor detected as “Plurox” comes with multiple plugins that expand its capabilities to include cryptomining and worm-like…

1 year ago

Cyberthreats Your Business Isn’t Prepared For

You have backups in the event your business is hit by ransomware. You have prepared PR statements should there be…

2 years ago

Coinhive shuts down | Avast

Cryptojacking stole the limelight away from ransomware at the end of 2017, becoming a major cyberthreat that continued into 2018.…

2 years ago