We look at the most pervasive information stealers, ransomware, and cryptocurrency-mining malware in the Americas in 2018 and how they highlight the significance of proactive threat detection and incident response capabilities.
Cryptocurrency: A cryptocurrency is an encrypted data string that denotes a unit of currency. It is monitored and organized by a peer-to-peer network called a blockchain, which also serves as a secure ledger of transactions, Read more
Looking back at the most significant issues of 2018, we saw shifting cybercriminal strategies and lingering security threats. Enterprises faced a multitude of challenges, but careful study of these issues can present opportunities for improvement.
Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
We recently encountered a cryptocurrency-mining malware affecting Linux systems. It is notable for being bundled with a rootkit component that hides the malicious process’ presence from monitoring tools.
Security researchers reported that cybercriminals have been targeting Kodi patrons with malicious Kodi add-ons that push cryptocurrency-mining malware binaries on Windows and Linux operating systems via a Python code.
Cryptocurrency-mining malware is not the only type of cryptocurrency-related threat — cybercriminals have resorted to using various tools and techniques designed to scam cryptocurrency exchange users, pilfer their funds, or steal their personal information.