crypto

Threat researchers have newly discovered malicious code in WAV audio files, code that hackers use to mine cryptocurrencies. Hackers earn thousand of dollars per month. On Oct. 19, researchers at BlackBerry Cylance, a software company that develops antivirus programs, reported the discovery of malicious code hidden within WAV audio files. ThisRead More →

crypto

French law enforcement authorities recently have been able to shut down a major Monero (XMR) cryptojacking operation. According to the Cybercrime Fighting Center (C3N), the malware, known as Retadup Monero, infected a total of 850,000 computers before the authorities could finally finish its activities by tricking it. As reported by BBC, the police teamRead More →

crypto

Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building large scale botnets. The Dofloo (aka AESDDoS) malware was first detected in 2014 [1, 2, 3, 4] and it is known for allowingRead More →

cryptocurrency

Base layer protocols: Base layer protocols are the peer-to-peer networks which form the basis of the Decentralized application (dApp) web. These base protocols are typically blockchains with an associated cryptocurrency coin secured by a consensus protocol where participants in the network decide collectively on the addition of new blocks toRead More →