Facebook will stop mining contacts with your 2FA number

Facebook clearly likes to use as much of your personal data as it feels it can, and that includes the…

Read More »

Fake WordPress Plugin Comes with Cryptocurrency Mining Function

Malicious plugins for WordPress websites are being used not just to maintain access on the compromised server but also to…

Read More »

Smominru Mining Botnet In Cyber Turf War With Rival Malware

The Smominru mining botnet continues to wreck havoc on corporate machines by not only installing cryptominers, but also stealing credentials, installing backdoors,…

Read More »

Information Security Books Recommended – Jingdong SRC Vulnerability Mining

Security Emergency Response Center's threat intelligence exploration, XSS attack and defense, CSRF attack and defense, upload vulnerability, brute force attack,…

Read More »

Ukrainian cyber police detained cryptocurrency mining software vendors

The malware developer is a certain Russian hacker group. Employees of the Ukrainian Cyber ​​Police detained two residents of Zaporozhye…

Read More »

New crypto-currency mining botnet targets Android devices via open ADB

A new cryptocurrency mining botnet has been discovered that uses the Android Debug Bridge (ADB) Wi-Fi interface and SSH connections…

Read More »

LoudMiner: Cross‑platform mining in cracked VST software

The story of a Linux miner bundled with pirated copies of VST (Virtual Studio Technology) software for Windows and macOS…

Read More »

A resident of China has stolen energy from an oil production facility for mining bitcoins

For this purpose, a man laid an electrical cable along the bottom of fish ponds. A resident of the Chinese…

Read More »

In the Russian Federation may introduce responsibility for mining cryptocurrency

Unconditioned actions with cryptocurrency will be considered illegitimate. In Russia, administrative responsibility can be introduced for the extraction of cryptocurrencies,…

Read More »
Back to top button