Cryptomining
Cisco Security at Work: Threatwall at Mobile World Congress 2019
3 min read
The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.
Malicious Cryptomining is Exploding. Are you at risk?
1 min read
With a 19x increase in crypto related traffic in the last nine months, it's time to find out if computing resources in your organization are being used without your knowledge.
Today’s critical threats: A Cisco Security threat report
2 min read
Download a copy of our first 2019 Threat Report, Defending against today’s critical threats today and start prepping for the things that are likely to come.
Cryptomining: A sheep or a wolf?
7 min read
One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to...
Cyber Threat Alliance Releases Cryptomining Whitepaper
1 min read
Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see...
Why download the exploit, when you can carry it with you?
5 min read
For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS).
Blocking Cryptocurrency Mining with Cisco Talos
1 min read
The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious...
Perspectives on Cryptomining
1 min read
If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio...
Protecting against crypto mining and malware
4 min read
It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious...