The Rise in Cryptomining

There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction of attackers are cybercriminals, individuals or well-established organizations looking to turn … Continue reading The Rise in Cryptomining

Leaked Point-of-Sale Malware Source Code Could Fuel New Variants

The source code for a malware program called TreasureHunter, which has been used to steal payment card information from point-of-sale (PoS) systems for years, is now available to cybercriminals for free. As with similar incidents in the past, research… Continue reading Leaked Point-of-Sale Malware Source Code Could Fuel New Variants