Bitcoin and Its Likely Impact on the Threat Landscape Unfortunately, the projected growth in the value of Bitcoin will likely have a devastating effect on the threat landscape. Daniel Smith | January 21, 2021
Have Crypto-Miners Infiltrated Your Public Cloud? How do you know if bad actors are siphoning off your power and racking up huge bills for your organization?… Haim Zelikovsky | July 16, 2019
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed… Pascal Geenens | November 15, 2018
Top Cryptomining Malware. Top Ransomware. In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are… Fabio Palozza | August 21, 2018
Malicious Cryptocurrency Mining: The Road Ahead As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still… Fabio Palozza | August 14, 2018
Raising the Bar for Ethical Cryptocurrency Mining In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In… Fabio Palozza | August 8, 2018
Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection By the end of the last year, we saw a drastic rise in drive-by cryptocurrency mining activities and it is… Fabio Palozza | August 1, 2018
Accessing Your Crypto Wallet Through Android Devices? Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that… Fabio Palozza | July 10, 2018
The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as… Fabio Palozza | June 19, 2018
Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain It’s quite evident how these days, attacks assume new forms along with transformations in the types of services that are… Fabio Palozza | June 6, 2018