• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Proofpoint

Smominru Botnet Using EternalBlue To Launch Cryptocurrency Attacks

February 7, 2018 By News Team Leave a Comment

Cybersecurity firm Proofpoint has been tracking the Smominru botnet, which has been earning millions of dollars for its operators by illegally mining the cryptocurrency Monero, which is using the EternalBlue exploit (CVE-2017-0144 SMB). Monero can’t … [Read more...] about Smominru Botnet Using EternalBlue To Launch Cryptocurrency Attacks

Filed Under: Bot Defense, Cryptocurrencies Tagged With: Adylkuzz, bitcoin, botnet, EternalBlue exploit, MineXMR, Monero, Proofpoint, SharkTech, Smominru, Windows

The Lazarus Group Targeting Cryptocurrency Users

December 22, 2017 By News Team Leave a Comment

The Lazarus Group is targeting cryptocurrency users, according to various figures in the security community, including cybersecurity firm Proofpoint (of Sunnyvale, California) who issued a report on Tuesday with information about “a number of … [Read more...] about The Lazarus Group Targeting Cryptocurrency Users

Filed Under: Bitcoin, Hacking Tagged With: bitcoin, bitcoin lurch, cryptocurrency, dotcom bubble, Lazarus Group, North Korea, North Korean sanctions, Proofpoint, South Korea's CWIC, Youbit

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.