Search results

Criminal campaign uses leaked NSA tools to set up cryptomining scheme, Trend Micro says

by Sean Lyngaas • 2 months ago

The research is a reminder that it is not just state-sponsored hackers that have reportedly co-opted the leaked NSA tools.

Binance cryptocurrency exchange blames hackers in theft of $40 million in bitcoin

by Jeff Stone • 4 months ago

“The hackers had the patience to wait, and execute well-orchestrated actions through multiple seemingly independent accounts at the most opportune time,” the company said.

Financial crime outpaces espionage as top motivation for data breaches, Verizon report finds

by Jeff Stone • 4 months ago

The figures again demonstrate how, despite an industrywide focus on technology, many breaches require human trust to be successful.

Chinese hackers found and repurposed elite NSA-linked tools

by Greg Otto • 4 months ago

Symantec has evidence that Chinese-linked hackers were using NSA-authored tools at least a year before they were publicly leaked by the Shadow Brokers.

International cops shutter two dark web sites, arrest three accused of running Wall Street Market

by Jeff Stone • 4 months ago

Wall Street Market featured more than 1.15 million customer accounts and 5,400 registered sellers who accepted payments in bitcoin and Monero.

Meet Sodinokibi, a ransomware strain that exploits a critical Oracle server flaw

by Jeff Stone • 4 months ago

Digital extortionists are exploiting a bug with a severity score of 9.8 out of 10 that Oracle sought to squash with a patch issued last week.

Cyberattack at med-tech conglomerate Hoya slowed production at Thai factory by 60 percent

by Jeff Stone • 5 months ago

Roughly 100 computers were infected with malicious software that stole user credentials, then tried to install a program that would co-opt those machines into mining for cryptocurrency.

The 'permission' question is much different for iOS and Android apps, researchers say

by Jeff Stone • 5 months ago

An Android app might be more likely to ask for access to technical functions. An iOS app might seek to use sensitive features, like the microphone. In any case, Wandera says, know what you're getting into.

That battery-saving app may have used your device to mine Monero, Symantec says

by Jeff Stone • 6 months ago

Microsoft has removed the apps from its store.

Cryptojacking malware gets past cloud security programs by uninstalling them

by Zaid Shoorbajee • 7 months ago

Palo Alto Networks says this type of evasive technique is likely to keep popping up.

TwitterFacebookLinkedInRedditGoogle Gmail