New R2D2 Technique Protects Files Against Wiper Malware

Haythem Elmir

Purdue University scientists have developed a data protection technique called Reactive Redundancy for Data Destruction (R2D2) that can protect data sitting inside a virtual machine from modern data-wiping malware and even some secure file deletion methods. Researchers say the new technique was successful in preventing wiper malware such as Shamoon (v1 and […]

Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers

Haythem Elmir

Legitimate and large-scale cryptocurrency mining operations often invest in dedicated hardware and electric consumption to make a profit. This doesn’t escape the attention of cybercriminals: Malicious cryptocurrency mining was so pervasive last year that it was the most detected network event in devices connected to home routers. Through our incident response-related monitoring, we observed intrusion attempts […]