Skip to content

xpool.eu

crypto news aggregator

Bitcoin Malware Procolored

Bitcoin Stealing Malware Found in Procolored Printer Drivers

Posted on: May 19, 2025

A Chinese printer manufacturer, Procolored, has been accused of distributing a Bitcoin-stealing malware alongside its official drivers. The company reportedly distributed the malicious software through USB drivers and […]

Cryptocurrency Cybersecurity Data Breach Malware

Cybersecurity News Roundup: Proprinter Malware, Dior Data Breach, and More

Posted on: May 17, 2025

This week’s cybersecurity news highlights a range of incidents impacting individuals and businesses. From printer malware stealing cryptocurrency to major brands facing data breaches, we round up the […]

Cryptocurrency Ethereum Malware

Inferno Drainer Malware: Crypto Theft Continues Despite Shutdown Claim

Posted on: May 9, 2025

Despite a purported shutdown last November, the Inferno Drainer malware is still actively stealing cryptocurrency from Ethereum and BNB Chain users. Over $9 million in funds have been […]

Cryptocurrency Malware Phishing

Inferno Drainer Malware Continues Operations: Cryptocurrency Theft Soars

Posted on: May 9, 2025

Despite claims that it ceased operations in November 2023, the cryptocurrency-stealing malware Inferno Drainer remains active and targets wallets of cryptocurrency users. According to a recent report by […]

COLDRIVER Cyber Espionage Malware

Google Identifies New Malware Targeting Western Individuals and Organizations

Posted on: May 8, 2025

A new report from Google Threat Intelligence reveals that the Russian-backed cyberespionage group, COLDRIVER, has escalated its tactics with the deployment of a sophisticated malware strain named LOSTKEYS. […]

COLDRIVER Cybersecurity Malware

COLDRIVER Malware Leverages Sophisticated Tactics to Steal Documents from Western Targets

Posted on: May 7, 2025

Google Threat Intelligence reports that cybercriminal group COLDRIVER is utilizing a new malware named LOSTKEYS to infiltrate targets in the West, targeting highly sensitive documents. This development marks […]

Cybersecurity File Theft Malware

Google Detects New Malware Targeting File Theft

Posted on: May 7, 2025

Google’s Threat Intelligence Group has recently discovered a new malware known as LostKeys, which poses a significant threat by targeting the theft of user files. The malicious software […]

Cryptocurrency Malware Security

New Crypto Wallet Malware Threat Exploits Open-Source Software

Posted on: April 15, 2025

Cybersecurity researchers have uncovered a concerning new threat targeting crypto wallets: malicious packages disguised as legitimate software downloads are exploiting vulnerabilities in popular open-source repositories like npm. These […]

Cryptocurrency Malware Software Supply Chain

New Malware Threatens Cryptocurrency Wallets via NPM Supply Chain

Posted on: April 14, 2025

A newly discovered malware campaign is targeting users of popular cryptocurrency wallets like Atomic and Exodus with a sophisticated attack that leverages software supply chains. ReversingLabs researchers have […]

Cryptocurrency Malware Wallet Security

Cryptocurrency Theft via Malware Campaign Targets Users of Popular Wallets

Posted on: April 13, 2025

New research reveals a sophisticated malware campaign is secretly stealing cryptocurrency funds from users of popular wallets like Atomic and Exodus. The attack leverages compromised software packages to […]

Cryptocurrency Cybersecurity Malware

Crypto Wallet Malware Injects Codes, Stealing Funds from Users

Posted on: April 13, 2025

Cybersecurity researchers have uncovered a sophisticated malware campaign targeting crypto users through compromised npm packages. The attack uses legitimate-looking software to steal digital assets from unsuspecting victims. Malicious […]

Cryptocurrency Security Malware Software Supply Chain Attacks

Cybersecurity Alert: New Malware Threat Targets Atomic & Exodus Wallet Users

Posted on: April 11, 2025

New cybersecurity threats targeting users of popular wallets, Atomic and Exodus, have been identified by PANews. Attackers are utilizing online code repositories to distribute malicious software packages, aiming […]

Cybersecurity Google Play Store Malware

Nigerian Users Warned About Malicious Websites Imitating Google Play Store

Posted on: April 10, 2025

The National Information Technology Development Agency (NITDA) has issued a warning to Nigerians about the ‘PlayPraetor Trojan,’ a new cybercrime attack targeting websites that mimic the Google Play […]

Cryptocurrency Malware SourceForge

Kaspersky Warns of New Malware Targeting Crypto Users via SourceForge

Posted on: April 9, 2025

Security firm Kaspersky has issued a warning about malware targeting crypto users through the software-hosting website SourceForge. A new investigation reveals that the legitimate project, Office Package, contains […]

Cryptocurrency Cybersecurity Malware

Kaspersky Discovers Crypto-Stealing Malware on Microsoft SourceForge

Posted on: April 9, 2025

Security firm Kaspersky has uncovered a sophisticated malware disguised as a Microsoft Office plugin lurking on the popular software repository SourceForge. This malicious program steals crypto from unsuspecting […]

Posts pagination

Previous page Page 1 Page 2 Page 3 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coins Pi Network Presale Price Prediction Qubetics Regulation Ripple SEC Security Shiba Inu Solana Stablecoin Stablecoins SUI Tariffs Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}