cryptocurrencies

The End of CoinHive and the Rise of Cryptojacking
CoinHive is a service that was created in September 2017. It allows users to mine Monero cryptocurrency using JavaScript. CoinHive has remarkably changed the income models of content developers over the course ...

The Emergence of Geopolitical Fuelled Cyber Attacks
A new breed of cyberattack is emerging into the threat landscape, fuelled by geopolitical tension, there has been a rise in stealthy and sophisticated cyber attacks reported within recent industry reports. Carbon ...
Cyber Security Roundup for July 2018
Dave Whitelegg | | adobe, cryptocurrencies, Cryptojacking, cyber security roundup, Data breach, data protection, facebook, Microsoft, MoneyTaker, nation-state, Ransomware, Third Party Security, Typeform
The importance of assuring the security and testing quality of third-party provided applications is more than evident when you consider an NHS reported data breach of 150,000 patient records this month. The ...

Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things
Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers are still choosing to automate their homes at an incredible rate. Currently ...

Criminals Hacking CPUs to Mine Cryptocurrencies
Nigel Kersh | | Allot Secure, Allot Secure Service Gateway SSG, Crypto, cryptocurrencies, cryptocurrency, Cryptojacking, cyber defense, Cyber Security, cybercrime, cybercriminals, ddos, DDoS Protection, DDoS Security, Internet of things, iot, IoT Security, Quality of Experience, Ransomware, security, Security as a Service, Service Providers
Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing ...
Cyber Security Roundup for February 2018
Dave Whitelegg | | adobe, APT37, cisco, cryptocurrencies, Cryptojacking, Cyber Crime, cyber security roundup, GDPR, ICO, Microsoft, patching, petya, security bloggers network
February saw over 5,000 websites infected by cryptocurrency mining malware after a popular accessibility plugin called ‘BrowseAloud’ was compromised by hackers. This led to several UK Government and Councils websites going offline, ...

New RIG malvertising campaign uses cryptocurrency theme as decoy
Jérôme Segura | | cryptocurrencies, Exploits, malvertising, RIG, RIGEK, security bloggers network, Threat analysis
This malvertising campaign uses a popular cryptocurrency theme to redirect users to the RIG exploit kit. Categories: Exploits Threat analysis Tags: cryptocurrenciesmalvertisingRIGRIGEK (Read more...) The post New RIG malvertising campaign uses cryptocurrency ...