B57

Pure Crypto. Nothing Else.

Android malware

Outlaw Hacking Group Escalates Attacks with New Toolkit: A Deep Dive

The Outlaw hacking group resurfaces with an updated toolkit targeting the automotive and finance industries, escalating their cybercrimes.

Microsoft Edge Takes a Stand Against Cryptojacking Malware

Discover how Microsoft Edge’s latest feature combats cryptojacking malware and protects users from illicit cryptocurrency mining.

Japanese Court Reconsiders Ruling on Cryptojacking Incident

Court overturns ruling in a cryptojacking case where a web designer profited off unsuspecting visitors. Justice catches up!

Inside the Lazarus Group’s Targeted Crypto Heist: A Deep Dive

Explore the tactics of the Lazarus Group in their $7 million attack on DragonEx and learn essential lessons for cybersecurity.

Beware the Kobe Bryant Cyber Scam: How Opportunistic Hackers Exploit Grief

Learn how opportunistic hackers are capitalizing on Kobe Bryant’s death to spread malicious software. Stay vigilant with these online safety tips.

Fighting Cryptojacking: Interpol and Trend Micro’s Battle Against Malware on MikroTik Routers

Discover how Interpol and Trend Micro are tackling cryptojacking on MikroTik routers and the implications of this growing digital threat.

Lazarus Group Intensifies Cyberattacks with New Malware Targeting Cryptocurrency Users

Discover how the Lazarus hacker group deploys new malware to target cryptocurrency users. Stay informed and protected.

News

Beware of Malware: The Risks of Cryptocurrency Chrome Extensions

A warning on cryptocurrency extensions: Beware of malware disguised as apps, especially Ledger Secure. Keep your assets safe!

Unmasking the MyKings Botnet: The Crypto Mining Menace Hidden in JPEGs

Explore the relentless MyKings botnet that disguises itself within JPEG images, mining Monero and evading detection.

Cryptojacking Scandal: Russian Citizens Accused of Illicit Cryptocurrency Mining

Two Russians face prosecution for allegedly hijacking computers to mine cryptocurrencies. Discover the implications in this cryptojacking saga.