Remove 2015 Remove Mining Remove Security Remove Video
article thumbnail

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency

Security Affairs

The Ukrainian Secret Service is investigating the case of employees at a nuclear power plant that connected its system online to mine cryp tocurrency. The security incident has happened in July at the South Ukraine Nuclear Power Plant at Yuzhnoukrainsk, in the south of the country. ” reported ZDnet. Pierluigi Paganini.

Mining 93
article thumbnail

Cryptojacking Coinhive Miners for the first time found on the Microsoft Store

Security Affairs

Security experts at Symantec have discovered eight potentially unwanted applications (PUAs) into the Microsoft Store that were dropping cryptojacking Coinhive miners. “As soon as the apps are downloaded and launched, they fetch a coin-mining JavaScript library by triggering Google Tag Manager (GTM) in their domain servers.

Mining 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BlackSquid malware uses multiple exploits to drop cryptocurrency miners

Security Affairs

Security experts at Trend Micro have discovered a new Monero cryptomining miner, dubbed BlackSquid, that is targeting web servers, network drives, and removable drives. “Simultaneous with its attacks, BlackSquid also downloads and executes two XMRig cryptocurrency-mining components.! continues the analysis. Pierluigi Paganini.

Mining 60
article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT), massive attacks and various botnets hit smart devices, These are 5 IoT Security Predictions for 2019. The regulation around IoT security was this year’s signal that the answer is, fortunately, no. Insights from VDOO’s leadership. 2019 will continue these trends but at a faster pace.

IoT 85
article thumbnail

Cranes, drills and other industrial machines exposed to hack by RF protocols

Security Affairs

Security experts from Trend Micro have discovered several vulnerabilities in the communication protocols used by cranes, hoists, drills and other industrial machines. Machines used in transportation, manufacturing, construction, and mining sectors often use radio frequency (RF) protocols. ” reads the report. Pierluigi Paganini.

article thumbnail

Expert released PoC for Outlook for Android flaw addressed by Microsoft

Security Affairs

Security researcher from F5 Networks that released more details and proof-of-concept for the recently addressed flaw in Outlook for Android. reads the security advisory published by Microsoft. This one is mine. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Microsoft cannot repro.

Mining 62
article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

If @1Password was to integrate with my newly released Pwned Passwords k-Anonymity model so you could securely check your exposure against the service (it'd have to be opt in, of course). My hope is that for many, this will be the prompt they need to make an important change to their online security posture. Oh wow - look at this!