The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That’s why we’re dedicating a series of posts to exploring its elements and updates made during one year of its evolution.
Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.
We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.
The world of Bitcoin is ablaze with profit, speculation, and potential riches for all. Unfortunately, scammers are in on the action and will stop at nothing to relieve the unwary of their digital fortunes. What are the threats, and what can you do to stay safe?