Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
A Node.js module with nearly two million downloads a week was compromised after the library was injected with malicious code programmed to steal bitcoins in wallet apps.
We recently encountered a cryptocurrency-mining malware affecting Linux systems. It is notable for being bundled with a rootkit component that hides the malicious process’ presence from monitoring tools.
Security researchers reported that cybercriminals have been targeting Kodi patrons with malicious Kodi add-ons that push cryptocurrency-mining malware binaries on Windows and Linux operating systems via a Python code.
Security researchers uncovered a cryptojacking campaign that exploits a vulnerability in MikroTik routers to inject a malicious version of Coinhive. Here’s what you need to know.