Tag "Crypto Mining"

Back to homepage
Software

Most wanted malware in January 2019: A new threat speaks up

Check Point’s Global Threat Index for January 2019 reveals a new backdoor Trojan affecting Linux servers, which is distributing the XMRig crypto-miner. The new malware, dubbed SpeakUp, is capable of

Software

New cryptomining malware removes other malware from Linux, then latches onto systems

A script capable of deleting known Linux malware and coin mining software in systems has been discovered by Trend Micro.  It then downloads a cryptocurrency-mining malware as well as install

Software

Speak Up Malware Targets Linux, Mac in New Campaign

Linux servers are the target of a new crypto-mining campaign in which a malware dubbed “Speak Up” implants a backdoor Trojan by exploiting known vulnerabilities in six different Linux distributions, according

Software

New Ransomware strain ‘hAnt’ targets Bitcoin mining rigs

The infected mining rigs include Antminer S9 and T9 devices used for Bitcoin mining and Antminer L3 rigs used for Litecoin mining. Security experts noted that hAnt comes hidden inside

Software

Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its presence from being noticed

Cloud

Four Cloud Security Predictions For 2019

The cloud is a vital part of any enterprise infrastructure. The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces. While

Software

Cryptomining Continues to Be Top Malware Threat

Enterprise organizations appear unlikely to get respite from cryptomining attacks anytime soon if new threat data from Check Point Software is any indication.For the thirteenth month in a row, attacks

Hardware/Network

HIMSS new cybersecurity report: Christmas virus, holes in Kubernetes and the year’s worst passwords

Forget lumps of coal, the new nasty cybersecurity stocking stuffer comes in the form of a Christmas virus, or rather a few of them. And those aren’t the only unwelcome

Software

What is cryptojacking? How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that

Hardware/Network

Can advancing cybersecurity techniques keep pace with new attack vectors in 2019?

A look back through a volatile 2018 has seen the cyber security landscape move towards an even more complex picture. This has been driven by the increased volume and diversity