Researchers from the security company Dr.Web reported a while back that the source code of a recent untitled Android bank Trojan was leaked.
In this article, I describe how my team at Alibaba Cloud implemented fuzzy hashing at scale, showing visualizations of our XOR DDoS detection.
This article will look at some common technologies and development trends of cryptocurrency mining Trojans, showing you how you can better project yourself.
Alibaba Cloud Security team has recently detected a crypto-mining attack which uses the newly published Jenkins RCE vulnerability as its attack vector.
Watchbog, a cryptocurrency-mining botnet, has made a comeback by exploiting Jenkins CVE-2018-1000861 this time.