This Week in Security News: Holiday Cybercriminals & Cryptomining Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Nov 2018 15:21:25 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn the common threats and the best practices for defending against cybercriminals during November’s online shopping season. Also, see the different cryptomining malware affecting Linux systems and…

The post This Week in Security News: Holiday Cybercriminals & Cryptomining Malware appeared first on .

Read more

Mac cryptocurrency ticker app installs backdoors

Credit to Author: Thomas Reed| Date: Mon, 29 Oct 2018 17:20:00 +0000

A Mac application named CoinTicker has been found installing two different backdoors, capable of keylogging, data theft, execution of arbitrary commands, and more.

Categories:

Tags:

(Read more…)

The post Mac cryptocurrency ticker app installs backdoors appeared first on Malwarebytes Labs.

Read more

Cybercriminals Changing Tactics as Seen in First Half Report

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 28 Aug 2018 12:05:30 +0000

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .

Read more

A week in security (July 30 – August 5)

Credit to Author: Malwarebytes Labs| Date: Mon, 06 Aug 2018 16:07:39 +0000

A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 30 – August 5) appeared first on Malwarebytes Labs.

Read more

The trend toward cryptojacking: What it is and how businesses can prevent it

Credit to Author: Trend Micro| Date: Tue, 24 Jul 2018 15:30:45 +0000

Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom. Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the…

The post The trend toward cryptojacking: What it is and how businesses can prevent it appeared first on .

Read more

Cybercrime tactics & techniques Q2 2018

Credit to Author: Malwarebytes Labs| Date: Tue, 17 Jul 2018 12:05:00 +0000

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Categories:

Tags:

(Read more…)

The post Cybercrime tactics & techniques Q2 2018 appeared first on Malwarebytes Labs.

Read more