• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Mining

Microsoft and AMD Stop Spectre Patches Updates

January 13, 2018 By News Team Leave a Comment

Since Microsoft issued the patches for the chipset vulnerabilities known as Meltdown and Spectre that came to light via Google’s Project Zero last week, people who have AMD computers have issued complaints about their computers crashing to a Blue … [Read more...] about Microsoft and AMD Stop Spectre Patches Updates

Filed Under: Mining, Vulnerabilities Tagged With: AMD chips, Intel, Meltdown, Microsoft, patches, Spectre

Hackers Exploit Oracle WebLogic Flaw

January 13, 2018 By News Team Leave a Comment

Security researchers are warning that hackers could still exploit the Oracle WebLogic flaw (CVE-2017-10271) if you didn’t install its critical patch last October. Enterprises that failed to do so may find their PeopleSoft and cloud-based servers … [Read more...] about Hackers Exploit Oracle WebLogic Flaw

Filed Under: cybersecurity, Mining Tagged With: Amazon cloud, cryptominers, Johannes Ulrich, Monero, Morphus Labs, Oracle cloud, PeopleSoft, Renato Marinho, unpatched servers, WebLogic

Cryptojacking Is On The Rise

December 14, 2017 By News Team Leave a Comment

A new phenomenon called cryptojacking is on the rise, involving cybercriminals secretly taking money from their victims, without even delivering malware to their computer or smartphone, when they visit infected websites. Cryptojacking took off a … [Read more...] about Cryptojacking Is On The Rise

Filed Under: Mining Tagged With: Coinhive, CPU, cryptocurrency, cryptojacking, Malwarebytes, mining, Monero, Webroot

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.