![wallet](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102045/wallet-400x200.jpg)
ICO protection: Key threats, attack tools and safeguards
Group-IB has analyzed the basic information security risks for the cryptoindustry and compiled a rating of key threats to an ICO (initial coin offering). On average, over 100 …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102542/biohazard-400x200.jpg)
Fake cryptocurrency wallet carries ransomware, leads to spyware
People around the world are rushing to acquire all kinds of cryptocurrency, hoping that prices will go up and they will be rolling in money when they sell their investment …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102336/bot-400x200.jpg)
What has the Necurs botnet been up to?
The Necurs botnet has been slowly growing since late 2012 and still tops the list of largest spam botnets in the world. Since then, the botnet has occasionally stopped or …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Researchers uncover mobile, PC surveillance platform tied to different nation-state actors
The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign that has targeted activists, journalists, lawyers, …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102056/google_play-400x200.jpg)
Infosec expert viewpoint: Google Play malware
Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Here’s what …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102623/skull-400x200.jpg)
Satori variant hacks into mining rigs, steals ETH by replacing wallet address
Qihoo 360 Netlab researchers warn about a new variant of the Satori malware that apparently goes after ether (ETH) mining rigs. The malware The malware, dubbed …
![healthcare ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102244/healthcare-ransomware2-400x200.jpg)
US hospital paid $55,000 ransom to hackers despite having backups
A US hospital has decided to pay a ransom of 4 bitcoin to regain access to some 1,400 files locked by attackers. Hancock Health, a regional hospital based in Greenfield, …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
The rise of ransom hacks, and the potential impact on your business
The percentage of companies reporting financially motivated cyber attacks has doubled over the past two years, with 50% of companies experiencing a cyber attack motivated by …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102325/iot-400x200.jpg)
IoT malware targeting zero-day vulnerabilities
Once it became evident that IoT devices can be relatively easily enslaved in botnets and that even their limited power can be used for a variety of nefarious purposes, it was …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102703/privacy-400x200.jpg)
Alleged Fruitfly macOS spyware author indicted
The mystery of the Fruitfly macOS malware has apparently been solved: a 28-year-old man from Ohio has been charged on Wednesday of allegedly creating and installing the …
![Monero](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102212/monero-400x200.jpg)
RIG EK covertly delivers cryptocurrency miners
Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. …
![healthcare ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102244/healthcare-ransomware2-400x200.jpg)
Healthcare breaches involving ransomware increase year-over-year
2017 has been a very challenging year for healthcare institutions as these organizations remain under sustained attack by cybercriminals that continue to target their …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?