SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Cryptomining stories - Page 2

Story image
CSOs - are you prepared for cloud cryptojacking?
Mon, 18th Feb 2019
#
iaas
#
cloud security
#
mfa
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Story image
Cybercrime tools and services becoming increasingly democratised
Thu, 7th Feb 2019
#
ddos
#
cybersecurity
#
cyber attacks
Findings from Check Point's new report reveal a concerning trend as cybercrime grows increasingly well-managed and accessible.
Story image
OT attacks and cryptominers on the rise – Skybox
Wed, 30th Jan 2019
#
cloud security
#
iot security
#
cios
Skybox Security’s 2019 Vulnerability and Threat Trends Report analyzes what shaped the threat landscape over 2018 and what it means for the year ahead.
Story image
Carbon Black releases 2019 global threat report
Mon, 28th Jan 2019
#
fileless malware
#
report
#
carbon black
Carbon Black warns of next-gen cyberattacks fuelled by geopolitical tensions in 2019 Global Threat Report.
Story image
Cryptomining affected 37% of businesses last year
Fri, 25th Jan 2019
#
ddos
#
cryptocurrency
#
malware
Report exposes stealthy cryptocrime surge in 2019, impacting 37% of global firms.
Story image
Malwarebytes reveals APAC countries most targeted by malware
Thu, 24th Jan 2019
#
cryptocurrency
#
blockchain
#
malware
The report identifies increases in backdoors, cryptocurrency miners, and the use of exploits against their endpoints.
Story image
Malware downloader on the rise in Check Point’s latest Threat Index
Wed, 16th Jan 2019
#
malware
#
cybersecurity
#
report
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Story image
2019’s top three cybersecurity trends - Akamai
Mon, 7th Jan 2019
#
ddos
#
predictions
#
cios
Cybercriminals have been moving towards a ‘gig economy’ – an underground community of malicious actors exchanging services.
Story image
2019 threat landscape predictions - Proofpoint
Tue, 18th Dec 2018
#
malware
#
email security
#
cybersecurity
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Story image
Cyber attacks develop complexity, target Windows sysad tools - report
Wed, 5th Dec 2018
#
firewall
#
malware
#
ddos
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
Story image
2018’s worst malware revealed in report
Fri, 2nd Nov 2018
#
ransomware
#
malware
#
ai security
Webroot's 'Nastiest Malware' list warns of botnets, ransomware and cryptomining menaces in 2018.
Story image
Cryptomining dethrones ransomware as 2018’s top threat - Webroot
Wed, 10th Oct 2018
#
ransomware
#
malware
#
phishing
This report also highlights the importance of implementing a robust and evolving security approach to protect valuable data and keep systems secure.
Story image
Protecting New Zealand in the new cybercrime threatscape
Mon, 17th Sep 2018
#
ransomware
#
malware
#
cybersecurity
New Zealand’s businesses are digitally transforming, supported by good internet infrastructure, and immersed in a culture of innovation.
Story image
Diginex and Symbioses deploy decentralised supercomputing network
Mon, 3rd Sep 2018
#
colocation
#
cryptocurrency
#
blockchain
Diginex will provide up to 2,500 nodes at its Switzerland data centre to perform optimised cryptocurrency mining on the Symbioses network.
Story image
Cryptomining and IoT attacks gunning for healthcare industry
Wed, 22nd Aug 2018
#
malware
#
iot security
#
it in healthcare
Medical staff now carry multiple connected devices with them, including personal devices that lack appropriate security controls.
Story image
MikroTik routers in NZ may be at risk of cryptomining - Symantec
Mon, 20th Aug 2018
#
router
#
cios
#
symantec
Mass coin miner hack hits 157k MikroTik routers; patch urgently says Symantec.
Story image
DC Two set to build Australia's first solar-powered data center
Wed, 8th Aug 2018
#
dc two
#
hadouken
#
cryptomining
The data center is currently being built in Collie, which is 200 kilometres south of Perth, in Western Australia.
Story image
Criminals aim for attack 'quality, not quantity' as malware volumes drop
Tue, 31st Jul 2018
#
malware
#
cybersecurity
#
malwarebytes
The crime lull may be a continuation of Q1’s drop, but cryptominers, ransomware, and exploits have opted for ‘quality, not quantity’.
Story image
Exclusive: Why NZ is particularly vulnerable to cryptomining
Wed, 11th Jul 2018
#
cloud services
#
iot security
#
wireless networks
Cryptomining is the newest cybersecurity threat dominating the headlines, but awareness of the attack method is still lacking among organisations.
Story image
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Story image
Criminals “infect and collect” in cryptocurrency mining surge
Fri, 6th Jul 2018
#
blockchain
#
cryptocurrency
#
casb
Coin miner malware grew a stunning 629% in the first quarter of 2018, rocketing from around 400,000 total known samples in Q4 2017 to more than 2.9mil.
Story image
Exclusive: Demystifying cryptojacking and how organisations can protect themselves
Thu, 5th Jul 2018
#
firewall
#
network management
#
network security
Cryptojacking is becoming the new go-to method for cybercriminals to monetise their malware, with a surge of 28% per quarter globally.
Story image
Cryptomining attacks to gain prevalence in H2 2018 – WatchGuard report
Mon, 2nd Jul 2018
#
firewall
#
ddos
#
malware
98.8% of Linux malwares in Q1 hid crypto-miners, reveals WatchGuard's security report.
Story image
Cyberthreats shifting with ransomware attacks down - research
Mon, 18th Jun 2018
#
ransomware
#
malware
#
cybersecurity
Ransomware attacks are significantly declining, and active defences strategies are highly effective but underutilised, according to ISACA.