The Hidden Bee infection chain, part 1: the stegano pack

The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That’s why we’re dedicating a series of posts to exploring its elements and updates made during one year of its evolution.

Read more

Fake browser update seeks to compromise more MikroTik routers

Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

Read more

Deepfakes FakeApp tool (briefly) includes cryptominer

We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.

Read more

There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market

The world of Bitcoin is ablaze with profit, speculation, and potential riches for all. Unfortunately, scammers are in on the action and will stop at nothing to relieve the unwary of their digital fortunes. What are the threats, and what can you do to stay safe?

Read more

Explained: blockchain technology

Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.

Read more

Select your language