SIEM as a Service
Home Search

cryptocurrency - search results

If you're not happy with the results, please do another search
Supershell – Open-Source Botnet That Obtain SSH Shell Access

Supershell – Open-Source Botnet That Obtain SSH Shell Access

The digital age offers opportunities but also increases the importance of cybersecurity as threats grow in complexity and sophistication, making preparedness a top priority. Open-source...
Threat Actors Deployed Hundreds of Python Packages to Steal System Data

Threat Actors Deployed Hundreds of Python Packages to Steal System Data

In the open-source ecosystem, shadows shift as collaboration succeeds, attracting both novices and skilled threat actors. A rising threat has been evolving and sharpening...
New Android Banking Malware Pose as Government App to Target Users

New Android Banking Malware Pose as Government App to Target Users

Cybercriminals continue making malware for profit, with a recent report uncovering ASMCrypt in underground forums related to the DoubleFinger loader. In the cybercrime landscape, researchers...
BunnyLoader: The new Malware-as-a-Service (MaaS) Under Rapid Development

BunnyLoader: New Malware-as-a-Service (MaaS) Under Rapid Development

A new malware-as-a-service (MaaS) loader under the name “BunnyLoader” has been discovered to be sold in multiple hacking forums. This malware has multiple functionalities...
Threat Actors Use Abnormal Certificates to Deliver Info-stealing Malware

Threat Actors Use Abnormal Certificates to Deliver Info-stealing Malware

Malicious certificates can be highly dangerous as they can be used to deceive users into trusting malicious websites or software. This can lead to various...
Konni APT Exploits WinRAR Vulnerability (CVE-2023-38831) To Attack The Digital Currency Industry

Konni APT Exploits WinRAR Vulnerability To Attack Financial & Crypto Industries

Konni, a North Korean APT group, launched the first attack against the cryptocurrency industry, exploiting a recently found WinRAR vulnerability tagged as CVE-2023-38831. According to the study,...
Threat and Vulnerability Roundup

Threat and Vulnerability Roundup For The Week Of 10th to September 16th

This week's Threat and Vulnerability Roundup from Cyber Writes brings you the most recent cybersecurity news.  The most recent attack methods, critical flaws, and exploits...
Caesars Entertainment Hacked: Over 6TB of Data Stolen

Caesars Entertainment Hacked: Over 6TB of Data Stolen

Caesars Entertainment Inc. has reportedly paid a substantial sum to hackers who infiltrated the company's systems and threatened to release sensitive data.  This breach follows...
Notorious OriginBotnet Attack Windows Machine Using Weaponized Word Document

OriginBotnet Attack Windows Machine Using Weaponized Word Document

A recent cyberattack effort was discovered that used a malicious Word document delivered via phishing emails, causing victims to download a loader that launched...
FBI Dismantle the Notorious Qakbot Infrastructure Used For Ransomware Attacks

FBI Dismantle the Notorious Qakbot Infrastructure Used For Ransomware Attacks

The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is utilized in ransomware attacks. More...
SIEM as a Service

Recent Posts