Archives

Cryptominers exploit miners vulnerabilities

Miners are under a new attack as Cryptominers exploit miners vulnerabilities. Programs that hijack computer resources to mine cryptocurrencies without permission are indeed a new threat in the list. In summary, the “old list” for miners reportedly encompassed for example: Ransomware, which holds a company’s data hostage until a ransom is paid. data leaks. worms that could break down equipement “a la” stuxnet focussing on the SCADA system. However, the real-life general list is way longer, as witnessed by a…

Read More

Archive

Hosted and powered by WR London.