Tag: Crypto

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

î ‚Aug 30, 2024î „Ravie LakshmananCryptojacking / Vulnerability Menace actors are actively exploiting a now-patched, important safety flaw impacting the Atlassian Confluence Information Middle and Confluence Server...

New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining

î ‚Aug 22, 2024î „Ravie LakshmananDatabase Safety / Cryptocurrency Cybersecurity researchers have unpacked a brand new malware pressure dubbed PG_MEM that is designed to mine cryptocurrency after...

Hackers linked to $14M Holograph crypto heist arrested in Italy

Suspected hackers behind the heist of $14,000,000 value of cryptocurrency from blockchain tech agency Holograph was arrested in Italy after dwelling a lavish life-style...

New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining

î ‚Aug 15, 2024î „Ravie LakshmananCommunity Safety / Cybercrime Cybersecurity researchers have found a brand new variant of the Gafgyt botnet that is focusing on machines with...

New Fickle Stealer Exploits Software program Flaws to Steal Crypto, Browser Information

Fortinet’s FortiGuard Labs found a Rust-based stealer in Might 2024 and named it the Fickle Stealer as a result of its intricate code and...

Warning: Markopolo’s Rip-off Concentrating on Crypto Customers by way of Faux Assembly Software program

î ‚Jun 19, 2024î „NewsroomCybercrime / Cryptocurrency A risk actor who goes by alias markopolo has been recognized as behind a large-scale cross-platform rip-off that targets digital...
spot_imgspot_img

Subscribe

Popular articles

Hackers Use Microsoft MSC Information to Deploy Obfuscated Backdoor in Pakistan Assaults

î ‚Dec 17, 2024î „Ravie LakshmananCyber Assault / Malware A brand new...

INTERPOL Pushes for

î ‚Dec 18, 2024î „Ravie LakshmananCyber Fraud / Social engineering INTERPOL is...

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

î ‚Dec 18, 2024î „Ravie LakshmananCyber Assault / Vulnerability Risk actors are...