2 min read - Digital attackers are leveraging ads on the Telegram messenger app to target cryptocurrency owners with samples of HackBoss malware. One notable element of this campaign is that it’s targeting people who want to make a buck through sketchy means themselves.…
2 min read - A malware strain dubbed Masad Stealer is using the Telegram messaging app to steal cryptocurrency by accessing browser passwords and clipboard information, security researchers learned.
2 min read - In the fist quarter of 2019, cryptocurrency theft has already reached 70 percent of what cybercriminals stole during all of last year.
2 min read - Security researchers discovered a sample of clipper malware that targeted Android users by lurking in the Google Play store.
4 min read - Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
2 min read - A recent study found that more than half of organizations around the world experienced a cryptocurrency mining attack last month, a trend that will likely continue as the crypto gold rush gains steam.
3 min read - The top network security trends for security professionals to monitor in 2018 include the evolution of AI, cryptocurrency crime, serverless apps, digital twins, the IoT and more.
2 min read - Cybercriminals recently breached two popular cryptocurrency platforms to steal personal information and digital funds to the tune of $300,000.
2 min read - As cryptocurrencies gain traction with banks and consumers, IT professionals must consider the cybersecurity implications of becoming a cashless society.
2 min read - Ethereum, a system for decentralized applications that uses blockchain, has hit a rough patch. The company recently dealt with a distributed denial-of-service (DDoS) attack. Ethereum DDoS Attack Origins The DAO exchange suffered a recursive code attack earlier this year. This…
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.