Malicious Cryptocurrency Mining, Cryptomining, Cryptojacking, Malmining

What is Malicious Cryptocurrency Mining?

First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.

zveloCTI-cyber-threat-intelligence

Router Vulnerabilities, Firmware Updates, and Trends in 2018

In a recent article published by IT Briefcase—zvelo Security Analyst, Louis Creager, outlined and describes one of the most prominent trends threatening router networks around the world. Ubiquitous as they are in our households, relatively few consumers are conscious of the firmware running on their home router

IoT Security & Networks Need Router Manufacturers Commitment

IoT Security Needs Commitment from Router Manufacturer’s to Maintain Device Firmware

One of the largest security gaps in 2018—one that leaves devices open to malware, botnets, and use in DDoS attacks—is the lack of commitment from router and gateway manufacturers. But what is the incentive for OEMs to build the infrastructure and systems to maintain and update device firmware even after just a few years?

Securely Logging & Tracing HTTP Requests in Go | zvelo

Securely Logging & Tracing HTTP Requests in Go

I was recently debugging a nasty issue in one of our backend services and needed to view the exact HTTP request & response being sent to an authentication server. Fortunately, Go’s standard library provides http.RoundTripper, httputil.DumpRequestOut & httputil.DumpResponse, which are great for dumping the exact out-bound request & the response. But since an authentication request contains credentials and a response contains a security token, it would have been insecure to record credentials & tokens in our logging systems. How could I securely exfiltrate the information I needed, while maintaining security and not requiring a whole lot of changes to my codebase or deployment environment?

devil's ivy

Devil’s Ivy Targets IoT Open Source Code Library

By Eric Watkins, Senior Malicious Detection Researcher at zvelo This week, a new security vulnerability subject to remote attack, known as Devil’s Ivy, is targeting the C++ library used by thousands of different IoT device vendors. The most popular devices being compromised are IoT video cameras; however, the associated risk is not limited to video…