Home Search
cryptocurrency - search results
If you're not happy with the results, please do another search
Supershell – Open-Source Botnet That Obtain SSH Shell Access
The digital age offers opportunities but also increases the importance of cybersecurity as threats grow in complexity and sophistication, making preparedness a top priority.
Open-source...
Threat Actors Deployed Hundreds of Python Packages to Steal System Data
In the open-source ecosystem, shadows shift as collaboration succeeds, attracting both novices and skilled threat actors. A rising threat has been evolving and sharpening...
New Android Banking Malware Pose as Government App to Target Users
Cybercriminals continue making malware for profit, with a recent report uncovering ASMCrypt in underground forums related to the DoubleFinger loader.
In the cybercrime landscape, researchers...
BunnyLoader: New Malware-as-a-Service (MaaS) Under Rapid Development
A new malware-as-a-service (MaaS) loader under the name “BunnyLoader” has been discovered to be sold in multiple hacking forums. This malware has multiple functionalities...
Threat Actors Use Abnormal Certificates to Deliver Info-stealing Malware
Malicious certificates can be highly dangerous as they can be used to deceive users into trusting malicious websites or software.
This can lead to various...
Konni APT Exploits WinRAR Vulnerability To Attack Financial & Crypto Industries
Konni, a North Korean APT group, launched the first attack against the cryptocurrency industry, exploiting a recently found WinRAR vulnerability tagged as CVE-2023-38831.
According to the study,...
Threat and Vulnerability Roundup For The Week Of 10th to September 16th
This week's Threat and Vulnerability Roundup from Cyber Writes brings you the most recent cybersecurity news.
The most recent attack methods, critical flaws, and exploits...
Caesars Entertainment Hacked: Over 6TB of Data Stolen
Caesars Entertainment Inc. has reportedly paid a substantial sum to hackers who infiltrated the company's systems and threatened to release sensitive data.
This breach follows...
OriginBotnet Attack Windows Machine Using Weaponized Word Document
A recent cyberattack effort was discovered that used a malicious Word document delivered via phishing emails, causing victims to download a loader that launched...
FBI Dismantle the Notorious Qakbot Infrastructure Used For Ransomware Attacks
The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is utilized in ransomware attacks.
More...