![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101011/bitcoin-400x200.jpeg)
Targeted attacks on crypto exchanges resulted in a loss of $882 million
Group-IB has estimated that cryptocurrency exchanges suffered a total loss of $882 million due to targeted attacks in 2017 and in the first three quarters of 2018. According …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101945/industry-400x200.jpeg)
GreyEnergy group targeting critical infrastructure with espionage
ESET has uncovered details of a successor to the BlackEnergy APT group. Named GreyEnergy by ESET, this threat actor focuses on espionage and reconnaissance, quite possibly in …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Cryptomining attacks against Apple devices increase sharply
Check Point has published its latest Global Threat Index for September 2018, revealing a near-400% increase in cryptomining malware attacks against Apple iPhones. These …
![Adobe Flash](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102905/adobe_flash_red-400x200.jpg)
Fake Flash updaters deliver cryptominers AND update Flash
Cryptominers have dethroned ransomware as the top malware threat and cybercriminals are coming up with new ways to keep the mining activity secret from the victims. One of …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100217/biohazard-malware-400x200.jpg)
Researchers link Industroyer to NotPetya
ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the Ukraine energy sector that resulted in blackouts …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
Cryptomining dethrones ransomware as top threat in 2018
Based on trends in the first half of 2018, Webroot found that cybercriminals are shifting to increasingly sophisticated and targeted means of attack while also expanding their …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100025/alert-400x200.jpg)
Most hosting providers take too long to remove malware distribution sites
How long does it take web hosting providers to remove malware distribution sites parked on their network? Roman Hussy, the Swiss security activist behind abuse.ch, says that, …
![storm](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104322/storm-400x200.jpeg)
Keeping your cloud malware-free: What you need to know
This year we’ve seen massive malware attacks spanning from nation state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105608/danger-400x200.jpg)
Phorpiex bots target remote access servers to deliver ransomware
Threat actors are brute-forcing their way into enterprise endpoints running server-side remote access applications and attempting to spread the GandCrab ransomware onto other …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105208/alert-400x200.jpg)
LoJax: First-ever UEFI rootkit detected in a cyberattack
ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax, this rootkit was part of a campaign …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102542/biohazard-400x200.jpg)
Cryptocurrency mining malware increases 86%
McAfee released its McAfee Labs Threats Report September 2018, examining the growth and trends of new cyber threats in Q2 2018. In the second quarter, they saw the surge in …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102056/google_play-400x200.jpg)
Stealthy cryptomining apps still on Google Play
Researchers have flagged 25 apps on Google Play that are surreptitiously mining cryptocurrency for their developers, and some of these have still not been removed, they warn. …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?