All posts in Cryptocurrency

by Paul Ducklin The graphics card that wants you to stick to playing games, the man that didn’t weigh 100 tons after all, and the marketing gang that used a browser bug to bombard iPhone users with scammy online surveys. With Kimberly Truong, Doug Aamoth and Paul Ducklin. Intro and . . . Read more
22 Feb, 2021
Bitcoin, BTC, cryptocoins, Cryptocurrency, DoS, ETH, ether, ethereum, Nvidia, Security News
0

by Paul Ducklin Nvidia, the graphics chip company that wants to buy ARM, made a unusual announcement last week. The company is about to launch its latest GeForce GPU (graphics processing unit) chip, the RTX 3060, and wants its users know that the chip is “tailored to meet the needs . . . Read more
05 Jan, 2021
crypto private keys, Cryptocurrency, DaoPoker, electroRAT, ETRADE, Golang programming language, Jamm, Linux, macOS, Malware, RAT, Security News, Windows
0

At least 6,500 cryptocurrency users have been infected by new, ‘extremely intrusive’ malware that’s spread via trojanized macOS, Windows and Linux apps. A new remote access tool (RAT) has been discovered being used in an extensive campaign. The attack has targeted cryptocurrency users in an attempt to collect their private . . . Read more
15 Dec, 2020
Android Debug Bridge, Cryptocurrency, Cryptominer, CVE-2020-10987, CVE-2020-17496, Exploit, github, Gitpaste-12, Hacks, IoT, IP cameras, Linux, Malware, Monero, Pastebin, Routers, Security News, Unix, vBulletin, Vulnerabilities, Web applications, worm
0

The worm returned in recent attacks against web applications, IP cameras and routers. The Gitpaste-12 worm has returned in new attacks targeting web applications, IP cameras and routers, this time with an expanded set of exploits for initially compromising devices. First discovered in a round of late-October attacks that targeted Linux-based . . . Read more
27 Nov, 2020
2021 predictions, Bug Bounty, Cloud Security, connected cars, Critical Infrastructure, Cryptocurrency, Cryptography, Cybersecurity, cybersecurity defense, extended detection and response, gurucul, InfoSec Insider, Internet of things, IoT, Malware, mfa, Ransomware, ransomware evolution, risk-based access control, robot overlords, Saryu Nayyar, Security News, Single sign on, Vulnerabilities, Web Security, XDR, zero day, Zero Trust
0

While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense. Predicting the future is always an iffy proposition. There’s the Nostradamus route, making predictions so cryptic and vague they could mean just about . . . Read more
23 Nov, 2020
CISA. vishing warning, Cryptocurrency, domain registry, GoDaddy, Hacks, liquid, Malware, mobile endpoint, nice hash, Phising, Security News, security training, social engineering, Vishing, vpn, Vulnerabilities, Web Security
0
‘Vishing’ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains NiceHash, Liquid.
28 Oct, 2020
2020 election, coronavirus, Cryptocurrency, Cryptography, Government, hack, Hackers, Hacking, Hacks, Malware, Monero, President Trump, Security News, threat actors, Trump campaign, twitter, voter fraud, voting
0
Hackers claim to have access to classified information linking the president to the origin of the coronavirus and criminal collusion with foreign actors.
13 Oct, 2020
AMD, attack spike, bluekeep, botnet, brute force, Cisco Talos, COVID-19, Cryptocurrency, cryptomining, DNS, GTX, lemon duck, Linux, Monero, Nvidia, RDP, Security News, Vulnerabilities, Web Security, Windows
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
05 Oct, 2020
AWS, beta, Black-T, Cloud Security, cloud systems, Crux worm, Crux worm miner, Cryptocurrency, cryptojacking, Malware, MASSCAN, mimipenquin, mimipy, Monero, Palo Alto Networks, pnscan, Rocke Pacha, Security News, teamtnt, Unit 42, worm, XMP, XMR mining, Zmap
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
02 Sep, 2020
Backdoor, BitTorrent, Cryptocurrency, Cryptography, cryptojacking, Czech Republic, data exfiltration, ESET, ethereum, KryptoCibule, Malware, Malware analysis, Monero, pirated games, pirated software, RAT, remote access Trojan, Security News, slovakia, Tor, wallet theft, Web Security
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.