Security News

SentinelOne and Intel announced a new method to detect cryptomining and cryptojacking attacks using hardware-based detection technology.

New samples of cryptomining malware performs a never-before-seen function: uninstalling cloud security products.

A new version of the NRSMiner is actively spreading in the southern region of Asia. The majority of detections (54%) have been found in Vietnam, followed by Iran (16%) and Malaysia (12%). The new...

Crypto-mining malware attacks against iPhones went up 400% in the last two weeks of September, security firm Check Point notes in a new report.

Check Point has published its latest Global Threat Index for September 2018, revealing a near-400% increase in cryptomining malware attacks against Apple iPhones. These attacks are using the...

Malware, in general, accounts for the majority of cybersecurity threats, but now cryptomining reigns supreme.

Based on trends in the first half of 2018, Webroot found that cybercriminals are shifting to increasingly sophisticated and targeted means of attack while also expanding their money making...

Despite their ubiquity, USB devices remain a critical cybersecurity threat.

Researchers have flagged 25 apps on Google Play that are surreptitiously mining cryptocurrency for their developers, and some of these have still not been removed, they warn. About the malicious...

Illicit cryptocurrency mining has been surging over the past year, in part due to a leaked software tool from the US National Security Agency, researchers said Wednesday. read more