Evolving Cyberthreats: It’s Time to Enhance Your IT Security Mechanisms

For years, cybersecurity professionals across the globe have been highly alarmed by threats appearing in the form of malware, including Trojans, viruses, worms, and spear phishing attacks. And this year was no different. 2018 witnessed its fair share … Continue reading Evolving Cyberthreats: It’s Time to Enhance Your IT Security Mechanisms

The Origin of Ransomware and Its Impact on Businesses

In previous articles we’ve mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll start with the basics and describe what ransomware is and ho… Continue reading The Origin of Ransomware and Its Impact on Businesses

Top Cryptomining Malware. Top Ransomware.

In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are getting advanced makeovers by cybercriminals doing their best to develop innovative cryptominers with grou… Continue reading Top Cryptomining Malware. Top Ransomware.

Malicious Cryptocurrency Mining: The Road Ahead

As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still doing their best to make the most out of their resources to launch leading-edge scam atte… Continue reading Malicious Cryptocurrency Mining: The Road Ahead

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will continue the discussion, explain what ethical mining is and the reason why this area c… Continue reading Raising the Bar for Ethical Cryptocurrency Mining

Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

By the end of the last year, we saw a drastic rise in drive-by cryptocurrency mining activities and it is quite alarming to note that cyber-criminals are getting smarter and smarter day-by-day at avoiding detection. Interestingly, cyber-criminals can … Continue reading Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

Accessing Your Crypto Wallet Through Android Devices?

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly susceptible to malicious cryptocurrency mining attacks. It is quite alarming … Continue reading Accessing Your Crypto Wallet Through Android Devices?

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year. In this article, I will continue digging deeper and discuss its patterns of invasions. As people k… Continue reading The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain

It’s quite evident how these days, attacks assume new forms along with transformations in the types of services that are widely used by consumers in a given period of time. Needless to mention, malware or malicious activities will find their pre… Continue reading Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain

Detecting Malware/APT Through Automatic Log Analysis

Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the potential to evade even the strongest signature-based security solutions that are currently … Continue reading Detecting Malware/APT Through Automatic Log Analysis