The Hidden Bee infection chain, part 1: the stegano pack
The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That’s why we’re dedicating a series of posts to exploring its elements and updates made during one year of its evolution.
Fake browser update seeks to compromise more MikroTik routers
Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.
Deepfakes FakeApp tool (briefly) includes cryptominer
We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.
There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market
The world of Bitcoin is ablaze with profit, speculation, and potential riches for all. Unfortunately, scammers are in on the action and will stop at nothing to relieve the unwary of their digital fortunes. What are the threats, and what can you do to stay safe?
Explained: blockchain technology
Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.