• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Coinhive

Hackers Modify Code in AOL Advertising Platform

April 20, 2018 By News Team Leave a Comment

Trend Micro researchers recently found that hackers had gained entry to, and then modified code, in AOL’s advertising platform to mine Monero cryptocurrency. 500 other websites are also thought to be infected with the same CoinHive cryptocurrency … [Read more...] about Hackers Modify Code in AOL Advertising Platform

Filed Under: Cryptomining, Hacking Tagged With: AOL advertising platform, Coinhive, cryptocurrency mining, cryptojacking, cryptomining, Monero, MSN Japanese web portal, Trend Micro, YouTube

Cryptojacking Is On The Rise

December 14, 2017 By News Team Leave a Comment

A new phenomenon called cryptojacking is on the rise, involving cybercriminals secretly taking money from their victims, without even delivering malware to their computer or smartphone, when they visit infected websites. Cryptojacking took off a … [Read more...] about Cryptojacking Is On The Rise

Filed Under: Mining Tagged With: Coinhive, CPU, cryptocurrency, cryptojacking, Malwarebytes, mining, Monero, Webroot

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.