Cryptocurrencies don't all work the same way. Some are minable, some aren't. For example, Ripple (XRP), Cardano (ADA) and Tether (USDT) aren't minable.
In one of our previous investigations into attacks on the service centers, FortiGuard Labs ran across a list of domains used by the criminals. During our subsequent monitoring process, we spotted a phishing HTML page on one of those webservers that was posing as a Dropbox login page.
More and more Smart TVs are connected to the Internet than ever before, with an estimated 760 million of them now connected globally. As new threats increasingly target IoT devices, such as Smart TVs, that include always-on connectivity and high-performance GPUs that can be hijacked for malicious purposes, FortiGuard Labs took the opportunity to look at the current security status of these devices.
To help mitigate the risk of a successful attack, agencies should maintain and consistently update their cybersecurity hygiene. The best practices listed above will help make effective security hygiene possible without compromising defenses against high-priority threats.
FortiGuard Labs recently encountered malicious traffic traveling to a C2 server located in China. The connection was established by a domain using a name that closely resembled one of Japan’s most famous express post delivery services. Our analysis showed that the website making this connection is fake, and moreover, it is spreading an Android malware.
The FortiGuard Labs research team recently captured a malware sample, an EXE file, which was signed by an invalid certificate. Once a victim opens the exe file, it installs two drivers to control the victim’s Windows system as well as monitors the Internet activities of the victim’s Web browser.
The CTA has just released a new joint analysis report on the growing threat of cryptomining, an activity that poses both short and long-term threats to individuals and enterprises. This report lays out the risk, its potential impacts, and the best practices organizations can employ to counter this rising menace.
For three years now, ETSI has conducted an NFV (Network Functions Virtualization) Plugtest event that provides an opportunity for vendors and open source communities to meet, collaborate, and assess the level of interoperability of their implementations and solutions, especially in multi-vendor environments.