Security News

400 Sites or More Fall Victim to Massive, Forced Monero Mining OperationA remote code execution vulnerability revealed in late March in the Drupal content management system is now being used on a...

If you receive a link for a video, even if it looks exciting, sent by someone (or your friend) on Facebook messenger—just don't click on it without taking a second thought. Cybersecurity...

A leaky Mongo database exposed personal information of 25,000 investors and potential investors tied to the Bezop cryptocurrency.

The two-hour event is the third recorded BGP hijack of Russian origin in the last 12 months. Maybe it's time to consider alternatives to BGP.

Essential Internet Infrastructure - DNS, BGP - Remains Vulnerable, Experts WarnAn attack spoofed internet routing information, resulting in anyone who visited MyEtherWallet.com - a free, open...

Air-gapped cryptocurrency wallets are believed to hold private keys stored in them secure, but an Israeli researcher has demonstrated that attackers can leak the keys from such wallets in a matter...

The Drupal vulnerability (CVE-2018-7600), dubbed Drupalgeddon2 that could allow attackers to completely take over vulnerable websites has now been exploited in the wild to deliver malware...

Leading the latest edition of the ISMG Security Report: Assessing cryptocurrencies' role in the latest ransomware and malware attacks. Plus: Facebook's revised estimate on account details accessed...

In an effort to prevent cryptojacking by extensions that maliciously mine digital currencies without users' awareness, Google has implemented a new Web Store policy that bans any Chrome extension...

Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post....