BOINC Malware: Understanding the Threats Posed and Removing the Malware
BOINC (Berkeley Open Infrastructure for Network Computing) is a platform that enables…
PureLand: A Mac Stealer Targeting Cryptocurrency Wallets
In the realm of cybersecurity, threats to Mac devices are on the…
“Bitcoin Mining” Scam: Threat Evaluation, Removal Steps, and Future Prevention
The "Bitcoin Mining" scam is a deceptive scheme designed to lure unsuspecting…
Win32/GenCBL.SJ Trojan: Threat Evaluation, Removal, and Prevention
Win32/GenCBL.SJ is a heuristic detection designed to generically identify a Trojan Horse.…
Glupteba, the sneaky new crypto-jacking malware that is being called ‘Unstoppable’
Glupteba malware is a sneaky new malware that hackers can control remotely,…
The Potentially Unwanted Program “Great Discover” Operates as a Cryptominer
Many individuals have attempted to get rich quickly as new digital currencies,…
The Bloom.exe File Points to a Cryptojacking Trojan
Over the past several years, as cryptocurrency has grown in popularity, enterprising…
Crypto-Mining Trojans May Masquerade as the Legitimate ‘AggregatorHost.exe’ Process
There have been reports by Windows users about the AggregatorHost.exe process running…