Security News
Change your passw... ugh, what's the point? Hackers have compromised hundreds of e-commerce sites running the popular open-source Magento platform to scrape credit card numbers and install...
While "cryptojacking"— whereby a website visitors' CPU is "borrowed" to mine for cryptocurrency — has been grabbing headlines with its rapid growth, I've read a few blasé comments from a few IT...
Vulnerable servers of all kinds are being targeted, compromised and made to mine cryptocurrencies for the attackers. Apache Solr servers under attack SANS ISC handler Renato Marihno warns about an...
The number of websites hosting code that mines for crypto-coins using visitors’ CPU power went up a staggering 725% in a four-month period, Cyren reports.
Threat actors are exploiting a recently patched vulnerability in Oracle WebLogic Server to infect systems with crypto-currency mining malware, FireEye reports. read more
Software download site/aggregator MacUpdate has been spotted delivering a new Mac crypto miner to users. A new Mac cryptominer was being distributed from hacked MacUpdate pages yesterday,...
Crypto mining botnets provide a stealthy way to generate big bucks, without the downsides of ransomware.
A recently discovered Linux crypto-miner botnet spreading over the SSH protocol is based on the Python scripting language, which makes it difficult to detect, F5 Networks has discovered. read more
BitTorrent, the company responsible for the development of the BitTorrent peer-to-peer protocol as well as that of μTorrent, a widely used torrent client, has been criticized for bundling the pop...