• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Ex Twitter employee found guilty of spying for Saudi Arabian government
  • Cisco fixed a flaw in ASA, FTD devices that can give access to RSA private key
  • Cisco was hacked by the Yanluowang ransomware gang
  • Risky Business: Enterprises Can’t Shake Log4j flaw
  • Experts found 10 malicious packages on PyPI used to steal developers' data
  • Hackers behind Twilio data breach also targeted Cloudflare employees
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "Cryptocurrency miner" (Page 3)

Cryptocurrency miner

ZombieBoy, a new Monero miner that allows to earn $1,000 on a monthly basis

A security researcher discovered a new crypto mining worm dubbed ZombieBoy that...

August 6, 2018  By Pierluigi Paganini

Hundreds of thousands MikroTik Routers involved in massive Coinhive cryptomining campaign

Experts uncovered a massive cryptojacking campaign that is targeting ...

August 3, 2018  By Pierluigi Paganini

Fileless PowerGhost cryptocurrency miner leverages EternalBlue exploit to spread

Security experts from Kaspersky Lab have spotted a new cryptocurrency miner...

July 31, 2018  By Pierluigi Paganini

Hacked Drupal sites involved in mining campaigns, RATs distributions, scams

Crooks are exploiting known vulnerabilities in the popular Drupal CMS such...

May 21, 2018  By Pierluigi Paganini

Nigelthorn malware infected over 100,000 systems abusing Chrome extensions

The Nigelthorn malware has already infected over 100,000 systems in 100 countries...

May 14, 2018  By Pierluigi Paganini

Malicious package containing Bytecoin cryptocurrency miner found on the Ubuntu Snap Store

An Ubuntu user has spotted a Bytecoin cryptocurrency miner hidden in the source...

May 13, 2018  By Pierluigi Paganini

CVE-2018-7602 – Drupal addressed a new vulnerability associated with Drupalgeddon2 flaw

The new flaw tracked as CVE-2018-7602, is a highly critical remote code...

April 26, 2018  By Pierluigi Paganini

HiddenMiner Android Cryptocurrency miner can brick your device

Researchers at Trend Micro recently discovered a new strain of Android...

April 2, 2018  By Pierluigi Paganini

Dofoil Trojan used to deploy cryptocurrency miner on more than 500,000 PCs in a few hours

Microsoft experts observed more than more than 500,000 computers infected...

March 9, 2018  By Pierluigi Paganini

Hackers compromised a Tesla Internal Servers with a Cryptocurrency miner

Cloud security firm RedLock discovered that hackers have compromised the Tesla...

February 22, 2018  By Pierluigi Paganini


1234
Page 3 of 4


Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT