SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Crypto Jacking stories

Story image
Darktrace notes health, retail and energy cyberattack trends
Fri, 13th Jan 2023
#
network security
#
firewalls
#
iam
The most observed 2022 cyber incident in Australia’s healthcare was suspicious network scan activity and multiple lateral movement model breaches in 2021.
Story image
Sysdig reveals a loss of $53 for every $1 cryptojackers gain
Fri, 30th Sep 2022
#
cloud security
#
application security
#
ddos
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Story image
Sysdig releases CDR offering to combat cryptojacking
Thu, 11th Aug 2022
#
application security
#
fintechs
#
advanced persistent threat protection
Sysdig has unveiled a cloud detection and response (CDR) offering powered by machine learning to combat cryptojacking.
Story image
Ransomware, threats, IoT malware, cryptojacking on the rise
Wed, 23rd Feb 2022
#
malware
#
ransomware
#
iot
Cyberattacks become more attractive and potentially more disastrous as dependence on information technology increases.
Story image
Cybercriminals target Linux-based systems with ransomware and cryptojacking
Thu, 10th Feb 2022
#
malware
#
virtualisation
#
ransomware
As the most common cloud operating system, Linux is quickly becoming an attacker’s ticket into a multi-cloud environment.
Story image
New botnet uncovered known for sextortion and crypto-jacking
Fri, 17th Dec 2021
#
cybersecurity
#
sextortion
#
check point software
Check Point Research is warning of a new variant of Phorpiex, a botnet known for sextortion and crypto-jacking.
Story image
How Bitcoin could impact the cyber-threat landscape
Wed, 27th Jan 2021
#
cryptocurrency
#
blockchain
#
cybersecurity
Bitcoin's surge in value has made cybercriminals rich, with the rise in profits driving a more financially motivated threat landscape.
Story image
Sophos unearths origin of prominent cryptominer
Fri, 22nd Jan 2021
#
firewalls
#
network infrastructure
#
network security
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
Story image
Cryptomining trojan malware discovered by ESET researchers
Thu, 3rd Sep 2020
#
firewalls
#
network infrastructure
#
network security
Newly discovered malware, KryptoCibule, is targeting victims in Czechia and Slovakia to steal cryptocurrencies undetected.
Story image
Phishing URLs grew by 640% last year - report
Fri, 21st Feb 2020
#
malware
#
phishing
#
email security
Phishing attempts have increased by 640% and malware targeting Windows 7 has risen by 125%, according to a new report by OpenText.
Story image
Five tips to defend against cryptojacking - Bitglass
Wed, 28th Aug 2019
#
malware
#
casb
#
cybersecurity
As cryptojacking rises, exploiting devices to mine cryptocurrency, Bitglass shares five crucial tips to safeguard your enterprise from this covert threat.
Story image
Wandera reports on the state of mobile security in financial services
Wed, 10th Jul 2019
#
fintechs
#
cybersecurity
#
crypto jacking
UK financial services face increasing cyber threats, with a 480% rise in data breaches reported in 2018, according to a report from Wandera.
Story image
How to avoid becoming a cryptojacking victim - Bitglass
Tue, 14th May 2019
#
cryptocurrency
#
blockchain
#
iaas
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Story image
Cyber threats progressing as defenses evolve - Trustwave
Mon, 29th Apr 2019
#
cybersecurity
#
social engineering
#
report
Trustwave's 2019 Global Security Report reveals a sharp rise in focused cyber threats and highlights the ongoing evolution of both attacks and defences.
Story image
Survey shows organisations in the dark about shadow mining threat
Wed, 3rd Apr 2019
#
cybersecurity
#
cryptomining
#
crypto jacking
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Story image
New threats on the block: Formjacking, IoT, LotL attacks
Tue, 26th Feb 2019
#
data privacy
#
iot security
#
privacy
Cybercriminals shift focus from ransomware to formjacking and IoT exploits, with Symantec’s latest report revealing tens of millions of dollars in losses.
Story image
Cryptomining apps discovered on Microsoft’s app store
Mon, 18th Feb 2019
#
malware
#
cybersecurity
#
symantec
Symantec discovers eight cryptomining apps on the Microsoft Store, exploiting users' CPUs to mine Monero. Microsoft has since removed the apps.
Story image
2018 sees 1,500% increase in coinmining malware - report
Wed, 19th Dec 2018
#
botnet
#
report
#
coinhive
The explosive growth of cryptocurrency in 2018 catapulted coinmining malware incidents by 1,500%, reveals eSentire's Annual Threat Report.
Story image
Mac malware on WatchGuard’s top ten list for first time
Tue, 18th Dec 2018
#
malware
#
firewalls
#
network infrastructure
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Story image
Exclusive: Securing cloud data in the APAC environment
Mon, 26th Nov 2018
#
ransomware
#
malware
#
phishing
The majority of users are unable to develop good cyber hygiene in line with the rapid rate of digitalisation that the APAC region is undergoing.