• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Monero

Hackers Modify Code in AOL Advertising Platform

April 20, 2018 By News Team Leave a Comment

Trend Micro researchers recently found that hackers had gained entry to, and then modified code, in AOL’s advertising platform to mine Monero cryptocurrency. 500 other websites are also thought to be infected with the same CoinHive cryptocurrency … [Read more...] about Hackers Modify Code in AOL Advertising Platform

Filed Under: Cryptomining, Hacking Tagged With: AOL advertising platform, Coinhive, cryptocurrency mining, cryptojacking, cryptomining, Monero, MSN Japanese web portal, Trend Micro, YouTube

PHP Weathermap Bug Allows Cryptocurrency Mining

March 23, 2018 By News Team Leave a Comment

Hackers are exploiting CVE-2013-2618, a five-year-old security vulnerability in Cacti’s Network Weathermap plug-in to infect x86-64 Linux web servers with cryptocurrency-mining malware. The Weathermap plug-in is an open source tool that network … [Read more...] about PHP Weathermap Bug Allows Cryptocurrency Mining

Filed Under: Cryptomining Tagged With: China, cryptocurrency mining, cryptomining, CVE-2013-2618, Japan, Monero, open source, PHP Weathermap, PHP Weathermap Bug, Taiwan, Trend Micro, U.S., vulnerability

PostgreSQL Malware Targeting The Open Source Database

March 18, 2018 By News Team Leave a Comment

PostgreSQL malware, which cryptomines the digital currency Monero, is being placed on PostgreSQL DBMS servers using an image of Hollywood actress Scarlett Johansson as its attack vector. According to security firm Imperva, whose StickyDB database … [Read more...] about PostgreSQL Malware Targeting The Open Source Database

Filed Under: Malware Tagged With: attack vector, AWS, crpytocurrency malware attacks, cryptomining, Imperva, Monero, PostgreSQL, PostgreSQL malware, Scarlet Johansson, Smominru miner, StickyDB database management system

Smominru Botnet Using EternalBlue To Launch Cryptocurrency Attacks

February 7, 2018 By News Team Leave a Comment

Cybersecurity firm Proofpoint has been tracking the Smominru botnet, which has been earning millions of dollars for its operators by illegally mining the cryptocurrency Monero, which is using the EternalBlue exploit (CVE-2017-0144 SMB). Monero can’t … [Read more...] about Smominru Botnet Using EternalBlue To Launch Cryptocurrency Attacks

Filed Under: Bot Defense, Cryptocurrencies Tagged With: Adylkuzz, bitcoin, botnet, EternalBlue exploit, MineXMR, Monero, Proofpoint, SharkTech, Smominru, Windows

Hackers Exploit Oracle WebLogic Flaw

January 13, 2018 By News Team Leave a Comment

Security researchers are warning that hackers could still exploit the Oracle WebLogic flaw (CVE-2017-10271) if you didn’t install its critical patch last October. Enterprises that failed to do so may find their PeopleSoft and cloud-based servers … [Read more...] about Hackers Exploit Oracle WebLogic Flaw

Filed Under: cybersecurity, Mining Tagged With: Amazon cloud, cryptominers, Johannes Ulrich, Monero, Morphus Labs, Oracle cloud, PeopleSoft, Renato Marinho, unpatched servers, WebLogic

Cryptojacking Is On The Rise

December 14, 2017 By News Team Leave a Comment

A new phenomenon called cryptojacking is on the rise, involving cybercriminals secretly taking money from their victims, without even delivering malware to their computer or smartphone, when they visit infected websites. Cryptojacking took off a … [Read more...] about Cryptojacking Is On The Rise

Filed Under: Mining Tagged With: Coinhive, CPU, cryptocurrency, cryptojacking, Malwarebytes, mining, Monero, Webroot

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.