Google Cloud's 2024 report highlights key cyber threats & defences
Google Cloud's 2024 Threat Horizons Report identifies credential misuse, cryptomining, ransomware, and data theft as the key cloud-related threats, citing the need for stringent defensive strategies.
Sysdig reveals a loss of $53 for every $1 cryptojackers gain
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Crypto app downloads down as market crashes - report
It appears the mass FOMO around crypto investing may be wearing thin with new data revealing a noticeable drop in crypto app downloads this year.
New threat intelligence from Sophos following the Apache Log4Shell vulnerability
Sophos warns of a surge in cyberattacks exploiting the Apache Log4Shell vulnerability, with attempts exceeding hundreds of thousands so far.
Sophos uncovers new variants of Tor2Mine cryptominer
Sophos researchers have discovered new variants of the Tor2Mine cryptominer that evade detection and spread through networks. .
Malicious cryptominer exploits MS Exchange Server vulnerabilities
Cybercriminals are exploiting Microsoft Exchange vulnerabilities despite warnings. Attacks include ransomware and cryptomining malware. Patching is crucial.
How Bitcoin could impact the cyber-threat landscape
Bitcoin's surge in value has made cybercriminals rich, with the rise in profits driving a more financially motivated threat landscape.
Sophos unearths origin of prominent cryptominer
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
SMBs in SEA region threatened by vastly increasing rates of cryptomining
Cryptomining is a growing threat to SMBs in Southeast Asia, with 1.7 million mining malware threats detected by Kaspersky in H1 2020.
Cryptomining trojan malware discovered by ESET researchers
Newly discovered malware, KryptoCibule, is targeting victims in Czechia and Slovakia to steal cryptocurrencies undetected.
Microsoft takes down malicious botnet after years of tracking
The botnet, called Necurs, gained control of the computers using malware and used them to commit crimes remotely.
Check Point report highlights latest cyber-threats worldwide
Check Point unveils 2020 Cyber Security threats; rampant cryptomining and targeted ransomware surge.
Carbon Black discovers evolution of popular cryptomining campaign
Attackers could theoretically pull in an estimated $1.6 million annually by leveraging this attack model, which began about two years ago.
Five tips to defend against cryptojacking - Bitglass
Hackers mine for crypto via 'cryptojacking', draining devices and cloud resources; firms face soaring costs.
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Ransomware attacks on the rise again - Malwarebytes
The report found that ransomware is seeing a 325% increase from previous year, and is the fourth-most detected threat against businesses in APAC.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Survey shows organisations in the dark about shadow mining threat
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Developing APAC countries most vulnerable to malware - Microsoft
The Asia-Pacific region remains a prime target for cybercriminals, according to Microsoft's Security Intelligence Report.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
Check Point names February’s most disruptive malware
Coinhive tops malware chart for 15th month amid rising global cyber threats, reports Check Point.
Cybercriminals earning over $3billion annually exploiting social platforms
Study: Cybercriminals exploit social media, costing billions globally.
IBM Security: Cybercriminals focusing on cryptojacking
IBM finds cybercrooks shunning ransomware, embracing cryptojacking for profits.