Sysdig reveals a loss of $53 for every $1 cryptojackers gain
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Crypto app downloads down as market crashes - report
It appears the mass FOMO around crypto investing may be wearing thin with new data revealing a noticeable drop in crypto app downloads this year.
New threat intelligence from Sophos following the Apache Log4Shell vulnerability
Sophos has provided new threat intelligence following the reporting of the Apache Log4Shell vulnerability.
Sophos uncovers new variants of Tor2Mine cryptominer
Sophos has released new findings on the Tor2Mine cryptominer that show how the miner evades detection, spreads automatically through a target network, and is increasingly harder to remove from an infected system.
Malicious cryptominer exploits MS Exchange Server vulnerabilities
"We are looking at yet another rapidly compiled, opportunistic and possibly experimental attack."
How Bitcoin could impact the cyber-threat landscape
Bitcoin's escalating valuation has made some criminal organisations and malicious individuals very wealthy. The impact of this growth in wealth may have a severe impact on the future threat landscape.
Sophos unearths origin of prominent cryptominer
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
SMBs in SEA region threatened by vastly increasing rates of cryptomining
According to Kaspersky's latest report, the global cybersecurity company has detected 1,726,799 mining attempts in the first half of this year targeting SMBs in SEA.
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Microsoft takes down malicious botnet after years of tracking
The botnet, called Necurs, gained control of the computers using malware and used them to commit crimes remotely.
Check Point report highlights latest cyber-threats worldwide
28% of all organisations worldwide were impacted by malicious multi-purpose botnets, while the rise of 20% of incident response cases were targeted ransomware attack.
Carbon Black discovers evolution of popular cryptomining campaign
Attackers could theoretically pull in an estimated $1.6 million annually by leveraging this attack model, which began about two years ago.
Five tips to defend against cryptojacking - Bitglass
The incidence of cryptojacking has seen rapid growth and has emerged as a favourite strategy for hackers.
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Ransomware attacks on the rise again - Malwarebytes
The report found that ransomware is seeing a 325% increase from previous year, and is the fourth-most detected threat against businesses in APAC.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Survey shows organisations in the dark about shadow mining threat
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
Check Point names February’s most disruptive malware
Check Point’s researchers confirm Coinhive holds the top position in February's Top Malware index for fifteenth successive month before it shut down, while GandCrab distribution campaigns increase.
Cybercriminals earning over $3billion annually exploiting social platforms
Social media platforms contain up to 20% more methods by which malware can be delivered to users – e.g. through adverts, shares, plug-ins – than comparable sources.
IBM Security: Cybercriminals focusing on cryptojacking
The report found that more than half of cybercriminal attacks pivot away from malware-based attacks.
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.