cryptocurrency
Malicious Cryptomining is Exploding. Are you at risk?
1 min read
With a 19x increase in crypto related traffic in the last nine months, it's time to find out if computing resources in your organization are being used without your knowledge.
Cryptomining: A sheep or a wolf?
7 min read
One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to...
Rocke: The Champion of Monero Miners
1 min read
Cryptocurrency miners are becoming an increasingly significant part of the threat landscape.
Who Wants to Be a Millionaire? Create Your Own Crypto Currency on a Blockchain
4 min read
The programming languages and tools you use to develop in the world of tokens and distributed applications, generally differ from blockchain to blockchain.
Cryptomining Campaign Returns Coal and Not Diamond
1 min read
Soon after a launch of a new cryptocurrency, Bitvote, in January, Talos discovered a new mining campaign affecting systems in India, Indonesia, Vietnam and several other countries that was tied...
The Many Tentacles of the Necurs Botnet
1 min read
This post was written by Jaeson Schultz. Introduction Over the past five years the Necurs botnet has established itself as the largest purveyor of spam worldwide. Necurs is responsible for emailing massive amounts of banking malware, ransomware, dating spam, pump-n-dump stock scams, work from home schemes, and even cryptocurrency wallet credential phishing. Necurs sends so much […]
Cryptojacking: Hijacking your computer resources
3 min read
Your internet connection is slower than usual, your PC is also very slow, and you notice that your CPU fan is running faster when you are on a given website. All the above symptoms indicate that you could be a victim of cryptojacking. This is a new kind of menace in which malicious users or […]
Cloud Unfiltered Podcast, Episode 18: Chris Riviere, Cisco
1 min read
Cloud security is the kind of topic that can make you sigh, shake your head, and quickly look for some other, less daunting project to deal with—no doubt about it. I mean honestly—what do you even define as “cloud” in your particular environment, and what constitutes “secure”? Is your only job to worry about your […]