Our research into cloud-based cryptocurrency mining sheds light on the malicious actor groups involved in this space, their ongoing battle for cloud resources, and the actual extent of the impact of their attacks.
SMS PVA services allow their customers to create disposable user profiles or register verified accounts on many popular platforms. Unfortunately, criminals can misuse these services to conduct fraud or other malicious activities.
As connected cars become more commonplace, the UN Regulation No. 155 sets guidelines to ensure cybersecurity in vehicles. This research assesses the risks of its highlighted attack vectors and looks beyond its scope to identify top priorities.