Tag: cryptocurrency mining

  • Hacker News: Please stop externalizing your costs directly into my face

    Source URL: https://drewdevault.com/2025/03/17/2025-03-17-Stop-externalizing-your-costs-on-me.html Source: Hacker News Title: Please stop externalizing your costs directly into my face Feedly Summary: Comments AI Summary and Description: Yes Summary: The text reflects a sysadmin’s frustration with the disruptive impact of LLM crawlers on operational stability. It discusses ongoing battles against the misuse of computing resources by malicious bots, underscoring…

  • The Register: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature

    Source URL: https://www.theregister.com/2025/02/28/cisa_kev_list_ransomware/ Source: The Register Title: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature Feedly Summary: 1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware…

  • Scott Logic: There is more than one way to do GenAI

    Source URL: https://blog.scottlogic.com/2025/02/20/there-is-more-than-one-way-to-do-genai.html Source: Scott Logic Title: There is more than one way to do GenAI Feedly Summary: AI doesn’t have to be brute forced requiring massive data centres. Europe isn’t necessarily behind in AI arms race. In fact, the UK and Europe’s constraints and focus on more than just economic return and speculation might…

  • Slashdot: Will Cryptomining Facilities Change Into AI Data Centers?

    Source URL: https://hardware.slashdot.org/story/25/02/03/0452259/will-cryptomining-facilities-change-into-ai-data-centers?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Will Cryptomining Facilities Change Into AI Data Centers? Feedly Summary: AI Summary and Description: Yes Summary: The text highlights the trend where cryptocurrency miners are transitioning their operations to accommodate AI data centers, leveraging existing infrastructure and energy resources. This shift indicates significant implications for both sectors and raises…

  • CSA: Emulating Cryptomining Attacks: A Deep Dive into Resource Draining with GPU Programming

    Source URL: https://cloudsecurityalliance.org/articles/emulating-cryptomining-attacks-a-deep-dive-into-resource-draining-with-gpu-programming Source: CSA Title: Emulating Cryptomining Attacks: A Deep Dive into Resource Draining with GPU Programming Feedly Summary: AI Summary and Description: Yes Summary: This text addresses the rising threat of cryptojacking in the context of cryptocurrency mining, outlining how attackers exploit organizational resources for malicious cryptomining activities. It provides a detailed explanation…

  • Schneier on Security: Perfectl Malware

    Source URL: https://www.schneier.com/blog/archives/2024/10/perfectl-malware.html Source: Schneier on Security Title: Perfectl Malware Feedly Summary: Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua…

  • Wired: Stealthy Malware Has Infected Thousands of Linux Systems for Years

    Source URL: https://arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/ Source: Wired Title: Stealthy Malware Has Infected Thousands of Linux Systems for Years Feedly Summary: Perfctl malware is hard to detect, persists after reboots, and can perform a breadth of malicious activities. AI Summary and Description: Yes Summary: The text discusses a stealthy malware strain named Perfctl that has infected thousands of…

  • Slashdot: Thousands of Linux Systems Infected By Stealthy Malware Since 2021

    Source URL: https://linux.slashdot.org/story/24/10/04/1759201/thousands-of-linux-systems-infected-by-stealthy-malware-since-2021?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Thousands of Linux Systems Infected By Stealthy Malware Since 2021 Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated malware strain named Perfctl that has infected numerous Linux systems since 2021. It exploits misconfigurations and a critical vulnerability in Apache RocketMQ, employing stealth techniques to…