SIEM as a Service
Home Search

cryptocurrency - search results

If you're not happy with the results, please do another search
How Is Social Media Used for Identity Theft?

How Is Social Media Used for Identity Theft?

Identity theft is only becoming more prevalent throughout the world as people share more and more information online and cybercriminals become stealthier and more...
3 Actions Enterprises Must Take After Suffering a Data Breach

3 Actions Enterprises Must Take After Suffering a Data Breach

Data security is paramount in modern organizations. Data breaches put your company in a vulnerable position. Not only do they attract heavy fines from...
Evilnum APT Hackers Group Attack Windows Using Weaponized Word Documents

Evilnum APT Hackers Group Attack Windows Using Weaponized Word Documents

Researchers from ThreatLabz uncovered Evilnum, an APT threat actor, is once again up to its old tricks targeting European financial and investment institutions, with some...
Tainted Password-Cracking Software Used to Deliver Sality Malware

Tainted Password-Cracking Software Used to Deliver Sality Malware

Researchers from Dragos discovered a smaller in-scale technique targeting industrial engineers and operators during their usual vulnerability assessment. Experts say threat actors used multiple accounts...
Uniswap Sophisticated Attack

Uniswap Sophisticated Attack – Over $8 million worth of Ethereum Stolen

As a result of a sophisticated phishing attack, UniSwap, one of the most popular decentralized cryptocurrency exchanges, lost a large amount of Ethereum worth...
Threat Actors Claimed that They Have Stolen Data of a Billion Chinese Residents

Threat Actors Claimed that They Have Stolen Data of a Billion Chinese Residents

A hacker claimed to have stolen one billion Chinese residents’ records from the Shanghai National Police database, which is considered the largest cybersecurity breach...
VPN basics: connection, installation, configuration, and shutdown

VPN basics: connection, installation, configuration, and shutdown

Nowadays, more and more requests in the search engines are related to the possibility of accessing the Internet safely. The reasons for that could...
MaliBot Android Malware

MaliBot – An Android Malware Attack Banking Victims & Steal Credentials, Cookies, and Bypass...

Researchers from F5 Labs have recently detected a newly discovered breed of Android malware, called MaliBot. This malware has been targeting people in Spain...
The Crypto Industry and its Security Challenges

The Crypto Industry and its Security Challenges

Digital assets made such an enormous breakthrough to the point where crypto has now become mainstream. With this type of popularity comes a lot...
Over 200 Malicious Android Apps

Over 200 Malicious Android Apps On The Play Store Used To Steal Sensitive Data

Researchers at Trend Micro found recently that more than 200 Android applications are on the Google Play Store spreading spyware known as "Facestealer," which...
SIEM as a Service

Recent Posts

Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer

A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The attack leverages exposed instances of Jupyter...