Cryptomining

February 27, 2019

SECURITY

Cisco Security at Work: Threatwall at Mobile World Congress 2019

3 min read

The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.

February 22, 2019

SECURITY

Malicious Cryptomining is Exploding. Are you at risk?

1 min read

With a 19x increase in crypto related traffic in the last nine months, it's time to find out if computing resources in your organization are being used without your knowledge.

February 14, 2019

SECURITY

Today’s critical threats: A Cisco Security threat report

2 min read

Download a copy of our first 2019 Threat Report, Defending against today’s critical threats today and start prepping for the things that are likely to come.

December 11, 2018

SECURITY

Cryptomining: A sheep or a wolf?

7 min read

One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to...

September 19, 2018

THREAT RESEARCH

Cyber Threat Alliance Releases Cryptomining Whitepaper

1 min read

Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see...

August 2, 2018

SECURITY

Why download the exploit, when you can carry it with you?

5 min read

For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS).

July 19, 2018

THREAT RESEARCH

Blocking Cryptocurrency Mining with Cisco Talos

1 min read

The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious...

April 26, 2018

SECURITY

Perspectives on Cryptomining

1 min read

If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio...

April 11, 2018

SECURITY

Protecting against crypto mining and malware

4 min read

It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious...