Firefox now blocks third-party tracking cookies, cryptomining scripts by default

It took a lot of testing and tweaking, but Mozilla’s Firefox browser is finally being delivered with Enhanced Tracking Protection and a web-based cryptomining blocking feature on by default. The changes “Enhanced Tracking Protection works b… Continue reading Firefox now blocks third-party tracking cookies, cryptomining scripts by default

Underwater robot made to map and search abandoned mines

Fans of the movie Prometheus will recall the probes that were sent into the alien structure, autonomously flying through it to create a 3D map of its interior. Well, something kind of similar is now in development, in the form of an underwate… Continue reading Underwater robot made to map and search abandoned mines

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks. The Ora… Continue reading Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

The correlation between DDoS attacks and cryptomining

There is a direct correlation between cryptocurrency and DDoS attacks. As the price of cryptocurrency dropped in 2018, leading to decreased profits from cryptomining, hackers on the black market began to divert prime botnet resources to DDoS attack act… Continue reading The correlation between DDoS attacks and cryptomining

Radio Free Blockchain: Bitcoin from Space

Cryptocurrencies: love them, hate them, or be baffled by them, but don’t think you can escape them. That’s the way it seems these days at least, with news media filled with breathless stories about Bitcoin and the other cryptocurrencies, and everyone from Amazon to content creators on YouTube now accepting …read more

Continue reading Radio Free Blockchain: Bitcoin from Space

Enterprise drone service Kespry raises new funding from Salesforce Ventures

Kespry, a company that offers industrial users a subscription-based drone service, today announced that it has raised funding from Salesforce Ventures, marking that firm’s first hardware investment. With this, Salesforce and Kespry are also partnering around bringing Kespry’s drone services for the insurance industry to Salesforce’s own tools for this vertical. Sadly, the companies did […] Continue reading Enterprise drone service Kespry raises new funding from Salesforce Ventures

Cryptojacking of businesses’ cloud resources still going strong

In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of cryptocurrencies like Bitcoin and Monero has been declining for a while now and Coinhive… Continue reading Cryptojacking of businesses’ cloud resources still going strong

Most wanted malware in January 2019: A new threat speaks up

Check Point’s Global Threat Index for January 2019 reveals a new backdoor Trojan affecting Linux servers, which is distributing the XMRig crypto-miner. The new malware, dubbed SpeakUp, is capable of delivering any payload and executing it on comp… Continue reading Most wanted malware in January 2019: A new threat speaks up

New Mac malware steals cookies, cryptocurrency and computing power

A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. About the CookieMiner malware Dubbed CookieMiner on account of its cookie-stealing capabilities,… Continue reading New Mac malware steals cookies, cryptocurrency and computing power

Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its presence from being noticed as long as possible is, na… Continue reading Mining malware evades agent-based cloud security solutions