LemonDuck, a cross-platform cryptocurrency mining botnet, is targeting Docker to mine cryptocurrency on Linux systems as part of an active malware campaign....
Cybersecurity research firm TrendMicro has come across a new Linux malware. The malware — Skidmap — is capable of illicit cryptocurrency mining...
Former Amazon employee Paige Thompson, who was arrested last month in relation to the Capital One data breach, has been accused of...
A couple of months back, ex-Amazon employee Paige Thompson was accused of gaining unauthorized access to the cloud servers of the US-based...
Avast has managed to take down the Retadup crypto-mining worm disinfecting more than 850,000 computers, with the help of French National Gendarmerie,...
It is a well-known fact that mining cryptocurrency requires heavy computing power and there is no better place than a nuclear power...
Cryptocurrency mining is a process in which transactions between users are checked and added to the open book of the blockchain. The...
Researchers have detected a campaign in which compromised docker hosts use Shodan for carrying out cryptocurrency mining. Hackers scan for Docker hosts...
A miner malware that uses a number of techniques that includes EternalBlue, Powershell abuse, pass-the-hash technique, Windows admin tools, and brute force...
The Chinese government is soon expected to ban all cryptocurrency mining activities in the country. It is suggested that the National Development...
Ethereum is the second biggest cryptocurrency with a massive $10 billion market capitalization. It also means that Ethereum mining and transactions gobble up...
Cybersecurity specialists from the International Institute of Cyber Security already predicted that this would be a difficult year for users and organizations,...
More than a security breach, the Pirate Bay has made the virtual currency mining a source for advertising. The Pirate Bay has...
Rakhni Trojan which was first discovered in 2013 has evolved over the course of five years. As an addition to its already...
Newly discovered cryptocurrency mining bot targeting the Internet of Things (IoT) devices which contain SSH service and IoT-related ports, including 22, 2222,...
Cryptocurrencies are digital or virtual currencies that make use of encryption for security. As they are anonymous and decentralized in nature, one...
Decatur County General Hospital in Parsons, Tennessee, is notifying more than 20,000 individuals that their health information was potentially compromised by an...
Where on earth you won’t expect cryptojacking scripts exploiting people’s machine for cryptocurrencies? Probably, the websites owned by feds. But it turns out,...
According to the information security companies, hidden cryptocurrency mining is very common lately. The boom of recent months in terms of the price of...
Security researchers from Palo Alto Networks detected a large-scale cryptocurrency mining operation than last for more than 4 months. Researchers believe it...
Cryptocurrency mining is on the rise and so does the number of instances where wrong ways are used to harvest the digital...