Cryptojacking of businesses’ cloud resources still going strong

In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of cryptocurrencies like Bitcoin and Monero has been declining for a while now and Coinhive… Continue reading Cryptojacking of businesses’ cloud resources still going strong

Increasing security measures are driving cybercriminals to alter their techniques

Increased security measures and awareness are driving cybercriminals to alter their techniques in search of a better return on investment (ROI). Total recorded vulnerabilities year over year. Source: X-Force Red Vulnerability Database. As a result, two… Continue reading Increasing security measures are driving cybercriminals to alter their techniques

ThreatList: Latest DDoS Trends by the Numbers

Trends in DDoS attacks show a evolution beyond Mirai code and point to next-gen botnets that are better hidden and have a greater level of persistence on devices – making them “far more dangerous.” Continue reading ThreatList: Latest DDoS Trends by the Numbers

New Mac malware steals cookies, cryptocurrency and computing power

A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. About the CookieMiner malware Dubbed CookieMiner on account of its cookie-stealing capabilities,… Continue reading New Mac malware steals cookies, cryptocurrency and computing power

$1.7 billion in cryptocurrency was stolen and scammed in 2018

$1.7 billion in cryptocurrency was stolen and scammed in 2018 — a dramatic rise in criminal activity despite a slump in the market, according to CipherTrace. Criminals need to launder all these funds in order to cash out before a wave of regulations go… Continue reading $1.7 billion in cryptocurrency was stolen and scammed in 2018

Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its presence from being noticed as long as possible is, na… Continue reading Mining malware evades agent-based cloud security solutions

Cryptocurrency craze drives coinmining malware surge

The cryptocurrency craze of 2018 helped drive a 1,500 percent increase in coinmining malware when compared to 2017, according to eSentire. Coinmining malware mines cryptocurrency (typically Monero) directly on infected endpoint devices (CoinMiner) or i… Continue reading Cryptocurrency craze drives coinmining malware surge