Crypto-mining kit built to send Monero to NK’s Kim Il Sung University
Is North Korea developing cryptocurrency mining malware to bypass economic sanctions?
Is North Korea developing cryptocurrency mining malware to bypass economic sanctions?
Enterprises are rushing to implement security tools to protect their networked environments – but those same tools comprised more than half of the 20 most vulnerability-ridden software products based on regular testing during the last quarter, according to new figures from Flexera Software.
David Braue | 30 Nov | Read more
Cybersecurity pros are most likely to leave to find more challenging work, better pay, and more flexible working hours, according to a survey released this morning.
Maria Korolov | 31 Mar | Read more
IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders.
Lucian Constantin | 17 Apr | Read more
The destructive malware program that the FBI alerted some companies about this week was likely used against Sony Pictures Entertainment, according to technical evidence found by researchers in the program's code.
Lucian Constantin | 05 Dec | Read more