web analytics
  • News and Threat Analysis

    NICOMINER GOES WILD, EXPLOITING MULTIPLE VULNERABILITIES TO MINE CRYPTOCURRENCY FROM SYSTEMS

    “NICO JIANG” – FROM A SMALL CRACKING TOOLS’ AUTHOR TO A MINER AUTHOR We all are adapting ourselves to the new normal where virtuality is the only way for authentication. But we can not ignore the fact that cryptocurrency is already known to get authentication without losing your identity. In this currency, authentication is just performed through a digital ledger and the identity of the person is kept anonymous. While some big influencers and celebrities like Elon Musk promote the use of this currency, from some past statistics, it has also been proven to be one of the best ways for the attackers to get paid for their illegal tasks.…

  • News and Threat Analysis

    WELCOME THE NEW CRYPTOJACKING WORM “CETUS” FOR DOCKER DAEMONS

    As technologies are getting more advanced, virtuality is becoming more friendly to human beings and when the word “virtual” comes, one word that comes into every tech geek’s mind is that of “Cloud Computing”. In today’s time , every second startup is dependent on cloud infrastructure instead of renting  servers as: Cloud infrastructure helps an organization to grow more with less number of employees. It also helps to get advantage of more resources in less cost. There are many other factors that overpower cloud computing to that of physical infrastructure but yes there are many IT companies out there who still uses their own physical infrastructure. Great Deal for Cloud…