cryptocurrency

Cryptojacking is the new malware
The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which these currencies are earned. At its core, mining …

The advent of GDPR could fuel extortion attempts by criminals
The number of exploit kit attacks is, slowly but surely, going down, and malware peddlers are turning towards more reliable tactics such as spam, phishing, and targeting …

Cryptomining malware continues to drain enterprise CPU power
Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global …

Millions of Android devices forced to mine Monero for crooks
No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still costs them nothing. With that in …

Thousands of government, orgs’ websites found serving crypto mining script
On Sunday, over 4,200 websites around the world started hijacking visitors’ browsers to mine the Monero crypto currency. The attack The problem was first noticed and …

Cybercrime shifts: Rise of Russian cybercrime, attacks on cryptocurrency marketplaces
Cryptocurrency marketplaces, designed to facilitate trading on the full range of digital currencies, are experiencing a range of fraudulent activity. The world of …

When crypto-mining malware hits a SCADA network
Stealthy crypto-mining is on track to surpass ransomware as cybercriminals’ most favorite money-making option, and companies with computers and servers that run all day …

Android devices roped into new Monero-mining botnet
A new Monero-mining bot sprang up several days ago and, in just a few days, has created a botnet consisting of over 7,000 Android devices, most of which are located in China …

Mac crypto miner distributed via MacUpdate, other software download sites
Software download site/aggregator MacUpdate has been spotted delivering a new Mac crypto miner to users. A new Mac cryptominer was being distributed from hacked MacUpdate …

The new gold rush: A look inside cryptocurrency fraud
Cybercriminals are flooding to the new world of cryptocurrencies looking to exploit the boom in interest and adoption of these electronic currencies, according to Digital …

Attackers disrupt business operations through stealthy crypto mining
WannaMine, a Monero-mining worm discovered last October, is increasingly wreaking havoc on corporate computers. Either by slowing down computers or by crashing systems and …

British cryptocurrency traders robbed of Bitcoin at gunpoint
Cryptocurrency heists are usually covert affairs that leave users with empty wallets, but not fearing for their life. Still, there are always some unlucky individuals who get …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility