A week in security (July 30 – August 5)

A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more.

Read more

Cybercrime tactics & techniques Q2 2018

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Read more

Mac malware targets cryptomining users

A new Mac malware called OSX.Dummy is being distributed on cryptomining chat groups that, even after being removed, leaves behind remnants for future malware to find.

Read more

A week in security (June 25 – July 1)

A round up of the security news from June 25 – July 1, including a look at the EU cyber force proposal, cryptomining dialing things down, and the risks of handing out personal information online.

Read more

A week in security (May 28 – June 3)

A roundup of the security news from May 28 – June 3, including Instagram scams, America Geeks, IoT flaws, and more.

Read more

New Mac cryptominer uses XMRig

New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs.

Read more

A week in security (April 16 – April 22)

A roundup of security news from April 16 – April 22, including tax fraud, Adobe Flash, trustjacking, and surveillanceware.

Read more

Labs CTNT report shows shift in threat landscape to cryptomining

What did we learn about cybercrime in the quarterly Labs CTNT report? Malicious cryptomining has taken over in 2018, and it’s leaving all other malware families behind.

Read more

Malicious cryptomining and the blacklist conundrum

When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult.

Read more

The state of malicious cryptomining

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language