Stealthy cryptomining apps still on Google Play

Researchers have flagged 25 apps on Google Play that are surreptitiously mining cryptocurrency for their developers, and some of these have still not been removed, they warn. About the malicious apps Disguised as games, utilities and educational offeri… Continue reading Stealthy cryptomining apps still on Google Play

Cybercriminals shift tools, tactics and procedures to improve infection rates

Trend Micro released its Midyear Security Roundup 2018, revealing that cybercriminals are moving away from attention-grabbing ransomware attacks to more covert methods intended to steal money and valuable computing resources. Half-year comparison of cr… Continue reading Cybercriminals shift tools, tactics and procedures to improve infection rates

Watch: An Account Takeover Attack Using Credential Stuffing, and How to Protect Against It [Video]

As cryptocurrencies continue to grow in diversity, so too do the threats they face, specifically those targeting the cryptocurrency exchange. Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric and a… Continue reading Watch: An Account Takeover Attack Using Credential Stuffing, and How to Protect Against It [Video]

Researchers to release open source tools to identify Twitter bots at scale

Duo Security published technical research and methodology detailing how to identify automated Twitter accounts, known as bots, at a mass scale. Using machine learning algorithms to identify bot accounts across their dataset, Duo Labs researchers also u… Continue reading Researchers to release open source tools to identify Twitter bots at scale

Compromised MikroTik routers power extensive cryptojacking campaign

A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker initially mainly focused on compromising devices located in Brazil but devices in … Continue reading Compromised MikroTik routers power extensive cryptojacking campaign

Three security trends to watch for at Black Hat USA 2018

Thus far in 2018, organizations and individuals worldwide have experienced a large number of high profile cyber attacks, with criminals stealing billions of dollars as well as personal information from hundreds of millions of people. Black Hat USA, an … Continue reading Three security trends to watch for at Black Hat USA 2018

Drupal, Phishing and A New Cryptomining Botnet

It’s a well-known fact that security solutions must quickly adapt to new attack methods. There are several ways to achieve this goal, regularly applying security patches and updates, relying on threat intelligence and more. At Imperva, we use pat… Continue reading Drupal, Phishing and A New Cryptomining Botnet