THE ILLICIT CRYPTOCURRENCY MINING THREAT

September 12, 2018

Illicit cryptocurrency mining has increased significantly in just a few months. This activity poses both a short- and long-term threat to individuals and enterprises. This threat is not victimless or harmless, so individuals and organizations should take steps to protect their systems. This report lays out the threat, its potential impacts, and the best practices organizations can employ to counter it.

Spotlight

LookingGlass Cyber Solutions

LookingGlass Cyber Solutions is the leader in threat intelligence and dynamic threat defense. LookingGlass solutions are uniquely architected to discover, understand, manage and mitigate threats both inside and outside an organization’s infrastructure.LookingGlass generates, sources and delivers the most extensive sources of threat data available out of the box through ScoutVision and Virus Tracker. The data is gathered, ingested, aggregated, normalized, enriched and analyzed to create threat intelligence. It is layered on top of continuous monitoring and assessment of global and organization specific Internet intelligence risks and activity for the ultimate threat visibility and understanding. Internet intelligence enables organizations to identify and track global Internet ownership, peer relationships, and route changes which gives LookingGlass and our customers unique insight into how corporate networks may be attacked through their public facing attack surface. LookingGlass Dynami

OTHER WHITEPAPERS
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More
news image

Secure by Design: Lexmark Print Devices

whitePaper | October 27, 2022

As organizations enhance the security of their infrastructure and move towards security methodologies and strategies, such as, Secure Access Service Edge (SASE), defense in depth, assume breach, and zero trust to provide tighter access controls, the print infrastructure must also adapt. It must become a strategic initiative to secure the print infrastructure and consider both internal and external threats. Data has become a cornerstone for innovation and has become a company's most valuable asset. Some of the challenges that companies face are inadequate security practices and too much data to manage. It is important to remember that security is not a solo sport, and as a community, we are stronger together.

Read More
news image

Asana Security and Privacy

whitePaper | October 26, 2022

Customers trust Asana with their data so that they can focus on the work that matters most to their businesses. That’s why we’re focused not only on creating an easy to-use collaborative work management solution, but also on keeping our customers’ data safe.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More

Spotlight

LookingGlass Cyber Solutions

LookingGlass Cyber Solutions is the leader in threat intelligence and dynamic threat defense. LookingGlass solutions are uniquely architected to discover, understand, manage and mitigate threats both inside and outside an organization’s infrastructure.LookingGlass generates, sources and delivers the most extensive sources of threat data available out of the box through ScoutVision and Virus Tracker. The data is gathered, ingested, aggregated, normalized, enriched and analyzed to create threat intelligence. It is layered on top of continuous monitoring and assessment of global and organization specific Internet intelligence risks and activity for the ultimate threat visibility and understanding. Internet intelligence enables organizations to identify and track global Internet ownership, peer relationships, and route changes which gives LookingGlass and our customers unique insight into how corporate networks may be attacked through their public facing attack surface. LookingGlass Dynami

Events