Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers
The Last Watchdog
AUGUST 3, 2018
It began when threat actors began stealthily embedding crypto mining functionality into the web browsers of unwitting individuals. And now, the next-level shift is underway. Cybercriminals have shifted their focus to burrowing onto company servers and then redirecting those corporate computing resources to crypto mining chores.
Let's personalize your content