CFOtech Asia - Technology news for CFOs & financial decision-makers

Cryptomining stories

Story image
Sysdig reveals a loss of $53 for every $1 cryptojackers gain
Fri 30 Sep 2022
#
cloud security
#
application security
#
ddos
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Story image
Crypto app downloads down as market crashes - report
Wed 13 Jul 2022
#
cryptocurrency
#
blockchain
#
cryptomining
It appears the mass FOMO around crypto investing may be wearing thin with new data revealing a noticeable drop in crypto app downloads this year.
Story image
New threat intelligence from Sophos following the Apache Log4Shell vulnerability
Wed 15 Dec 2021
#
malware
#
firewall
#
ransomware
Sophos has provided new threat intelligence following the reporting of the Apache Log4Shell vulnerability.
Story image
Sophos uncovers new variants of Tor2Mine cryptominer
Mon 6 Dec 2021
#
malware
#
firewall
#
network management
Sophos has released new findings on the Tor2Mine cryptominer that show how the miner evades detection, spreads automatically through a target network, and is increasingly harder to remove from an infected system.
Story image
Malicious cryptominer exploits MS Exchange Server vulnerabilities
Thu 22 Apr 2021
#
firewall
#
network management
#
network security
"We are looking at yet another rapidly compiled, opportunistic and possibly experimental attack."
Story image
How Bitcoin could impact the cyber-threat landscape
Wed 27 Jan 2021
#
cryptocurrency
#
blockchain
#
cybersecurity
Bitcoin's escalating valuation has made some criminal organisations and malicious individuals very wealthy. The impact of this growth in wealth may have a severe impact on the future threat landscape.
Story image
Sophos unearths origin of prominent cryptominer
Fri 22 Jan 2021
#
firewall
#
network management
#
network security
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
Story image
SMBs in SEA region threatened by vastly increasing rates of cryptomining
Tue 22 Sep 2020
#
cybersecurity
#
smb
#
kaspersky
According to Kaspersky's latest report, the global cybersecurity company has detected 1,726,799 mining attempts in the first half of this year targeting SMBs in SEA.
Story image
Cryptomining trojan malware discovered by ESET researchers
Thu 3 Sep 2020
#
firewall
#
network management
#
ai
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Story image
Microsoft takes down malicious botnet after years of tracking
Fri 13 Mar 2020
#
malware
#
ddos
#
microsoft
The botnet, called Necurs, gained control of the computers using malware and used them to commit crimes remotely.
Story image
Check Point report highlights latest cyber-threats worldwide
Tue 21 Jan 2020
#
ddos
#
cloud security
#
botnet
28% of all organisations worldwide were impacted by malicious multi-purpose botnets, while the rise of 20% of incident response cases were targeted ransomware attack.
Story image
Carbon Black discovers evolution of popular cryptomining campaign
Mon 2 Sep 2019
#
carbon black
#
report
#
cryptomining
Attackers could theoretically pull in an estimated $1.6 million annually by leveraging this attack model, which began about two years ago.
Story image
Five tips to defend against cryptojacking - Bitglass
Wed 28 Aug 2019
#
malware
#
casb
#
bitglass
The incidence of cryptojacking has seen rapid growth and has emerged as a favourite strategy for hackers.
Story image
Check Point: Attackers executing commands remotely with latest malware
Wed 14 Aug 2019
#
malware
#
iot security
#
security vulnerabilities
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Story image
How to avoid becoming a cryptojacking victim - Bitglass
Tue 14 May 2019
#
cryptocurrency
#
iaas
#
mfa
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Story image
Ransomware attacks on the rise again - Malwarebytes
Fri 3 May 2019
#
malware
#
ransomware
#
cybersecurity
The report found that ransomware is seeing a 325% increase from previous year, and is the fourth-most detected threat against businesses in APAC.
Story image
Cryptojacking and failure to patch still major threats - Ixia
Tue 16 Apr 2019
#
cybersecurity
#
ixia
#
patching
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Story image
Survey shows organisations in the dark about shadow mining threat
Wed 3 Apr 2019
#
cybersecurity
#
cryptojacking
#
cryptomining
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Story image
Developing APAC countries most vulnerable to malware - Microsoft
Fri 22 Mar 2019
#
microsoft
#
malware
#
ransomware
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Story image
Ransomware’s decline equals cryptomining’s rise
Tue 19 Mar 2019
#
malware
#
ransomware
#
cybersecurity
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
Story image
Check Point names February’s most disruptive malware
Tue 12 Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Check Point’s researchers confirm Coinhive holds the top position in February's Top Malware index for fifteenth successive month before it shut down, while GandCrab distribution campaigns increase.
Story image
Cybercriminals earning over $3billion annually exploiting social platforms
Mon 11 Mar 2019
#
cybersecurity
#
social media
#
cybercrime
Social media platforms contain up to 20% more methods by which malware can be delivered to users – e.g. through adverts, shares, plug-ins – than comparable sources.
Story image
IBM Security: Cybercriminals focusing on cryptojacking
Mon 4 Mar 2019
#
ibm security
#
report
#
powershell
The report found that more than half of cybercriminal attacks pivot away from malware-based attacks.
Story image
CSOs - are you prepared for cloud cryptojacking?
Mon 18 Feb 2019
#
cloud security
#
iaas
#
mfa
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
© 2022 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.