CFOtech Asia - Technology news for CFOs & financial decision-makers

Cryptojacking stories

Story image
Sysdig reveals a loss of $53 for every $1 cryptojackers gain
Fri 30 Sep 2022
#
cloud security
#
application security
#
ddos
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Story image
Sysdig releases CDR offering to combat cryptojacking
Thu 11 Aug 2022
#
ai
#
ml
#
cloud
Sysdig has unveiled a cloud detection and response (CDR) offering powered by machine learning to combat cryptojacking.
Story image
Ransomware, threats, IoT malware, cryptojacking on the rise
Wed 23 Feb 2022
#
malware
#
ransomware
#
cybersecurity
Cyberattacks become more attractive and potentially more disastrous as dependence on information technology increases.
Story image
Cybercriminals target Linux-based systems with ransomware and cryptojacking
Thu 10 Feb 2022
#
malware
#
virtualisation
#
ransomware
As the most common cloud operating system, Linux is quickly becoming an attacker’s ticket into a multi-cloud environment. 
Story image
New botnet uncovered known for sextortion and crypto-jacking
Fri 17 Dec 2021
#
cybersecurity
#
cryptojacking
#
sextortion
Check Point Research is warning of a new variant of Phorpiex, a botnet known for sextortion and crypto-jacking.
Story image
How Bitcoin could impact the cyber-threat landscape
Wed 27 Jan 2021
#
cryptocurrency
#
blockchain
#
cybersecurity
Bitcoin's escalating valuation has made some criminal organisations and malicious individuals very wealthy. The impact of this growth in wealth may have a severe impact on the future threat landscape.
Story image
Sophos unearths origin of prominent cryptominer
Fri 22 Jan 2021
#
firewall
#
network management
#
network security
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
Story image
Cryptomining trojan malware discovered by ESET researchers
Thu 3 Sep 2020
#
firewall
#
network management
#
ai
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Story image
Phishing URLs grew by 640% last year - report
Fri 21 Feb 2020
#
malware
#
phishing
#
cybersecurity
“In the cybersecurity industry the only certainty is that there is no certainty, and there is no single silver bullet solution.”
Story image
Five tips to defend against cryptojacking - Bitglass
Wed 28 Aug 2019
#
malware
#
casb
#
bitglass
The incidence of cryptojacking has seen rapid growth and has emerged as a favourite strategy for hackers.
Story image
Wandera reports on the state of mobile security in financial services
Wed 10 Jul 2019
#
cybersecurity
#
financial services organisations
#
cryptojacking
“In the financial services industry, as in many sectors, the security of client information is the most important asset."
Story image
How to avoid becoming a cryptojacking victim - Bitglass
Tue 14 May 2019
#
cryptocurrency
#
iaas
#
mfa
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Story image
Cyber threats progressing as defenses evolve - Trustwave
Mon 29 Apr 2019
#
cybersecurity
#
trustwave
#
report
The findings illustrate cybercriminals deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills.
Story image
Survey shows organisations in the dark about shadow mining threat
Wed 3 Apr 2019
#
cybersecurity
#
cryptojacking
#
cryptomining
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Story image
New threats on the block: Formjacking, IoT, LotL attacks
Tue 26 Feb 2019
#
gdpr
#
iot security
#
privacy
Symantec's report provides an overview of the threat landscape, including insights into global threat activity, cyber criminal trends, and motivations for attackers.
Story image
Cryptomining apps discovered on Microsoft’s app store
Mon 18 Feb 2019
#
microsoft
#
malware
#
symantec
It is believed that the eight apps were likely developed by the same person or group.
Story image
2018 sees 1,500% increase in coinmining malware - report
Wed 19 Dec 2018
#
botnet
#
report
#
coinhive
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
Story image
Mac malware on WatchGuard’s top ten list for first time
Tue 18 Dec 2018
#
malware
#
firewall
#
apple
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Story image
Exclusive: Securing cloud data in the APAC environment
Mon 26 Nov 2018
#
ransomware
#
malware
#
phishing
The majority of users are unable to develop good cyber hygiene in line with the rapid rate of digitalisation that the APAC region is undergoing.
Story image
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Tue 18 Sep 2018
#
malware
#
firewall
#
ransomware
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
Story image
Exclusive: Why NZ is particularly vulnerable to cryptomining
Wed 11 Jul 2018
#
iot security
#
wireless networks
#
exclusive
Cryptomining is the newest cybersecurity threat dominating the headlines, but awareness of the attack method is still lacking among organisations.
Story image
Exclusive: Demystifying cryptojacking and how organisations can protect themselves
Thu 5 Jul 2018
#
firewall
#
network management
#
ai
Cryptojacking is the latest step in the evolution of malware monetisation methods.
Story image
Here’s what the threat landscape currently looks like, according to Fortinet
Fri 22 Jun 2018
#
firewall
#
malware
#
ransomware
Fortinet says there are indications that some cybercriminals now prefer hijacking systems and using them for cryptomining.
Story image
EXCLUSIVE: Rick McElroy shares how he’d breach an enterprise
Sat 16 Jun 2018
#
ransomware
#
malware
#
cybersecurity
Carbon Black’s Rick McElroy asserts at the end of the day, cyberwar is not about systems but rather humans vs humans as they are the weakest link.
© 2022 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.