With increased deployment of security solutions on cloud infrastructure, hackers have started adopting detection evasion tactics from Windows desktop computers to cloud environments. One such tactic ...
The XMRig CPU Miner is a legitimate cryptocurrency mining program that is used to mine for cryptocurrency using a computer's CPU. Unfortunately, this progrma is also commonly used by malware ...
A known Chinese advanced persistent threat (APT) group known as Mustang Panda is the likely culprit behind a sophisticated, ongoing cyber-espionage campaign. It starts with a malicious email, and ...
A new cryptominer malware that infected almost all the computers on a company's network within a year uses DuckDNS for command and control (C2) communications with its masters. Cryptomining (also ...
Researchers have documented the use of a process hollowing technique to disguise the presence of cryptocurrency mining malware on infected systems. On Wednesday, Trend Micro researchers Arianne Dela ...
PyPI is popular among Python programmers for sharing and downloading code. Since anyone can contribute to the repository, malware – sometimes posing as legitimate, popular code libraries – can appear ...
A new Apache Struts campaign that researchers named “Zealot” has come to light in recent weeks. Zealot loads Windows or Linux-based machines by installing a miner for Monero, which has become one of ...