Blog
  • Intelligence Center
    • Intelligence Center

    • Intelligence Search
    • Email & Spam Trends
  • Vulnerability Research
    • Vulnerability Research

    • Vulnerability Reports
    • Microsoft Advisories
  • Incident Response
    • Incident Response

    • Reactive Services
    • Proactive Services
    • Emergency Support
  • Blog
  • Support
    More
  • Security Resources

    Security Resources

    Security Resources
    • Open Source Security Tools
    • Intelligence Categories Reference
    • Secure Endpoint Naming Reference
  • Media

    Media

    Media
    • Talos Intelligence Blog
    • Threat Source Newsletter
    • Beers with Talos Podcast
    • Talos Takes Podcast
    • Talos Videos
  • Company

    Company

    Company
    • About Talos
    • Careers

Cyber Security Week in Review (March 1)

By Jonathan Munshaw

Friday, March 1, 2019 09:55
Cryptocurrency
Share this post

Related Content

How do cryptocurrency drainer phishing scams work?

July 9, 2024 08:00

In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials.

Following the Money: Comparing cryptocurrency value to illicit mining activity

July 14, 2021 08:20

By Nick Biasini In the age of meme stocks, Robinhood and Elon Musk's tweets influencing the global economy, cryptocurrency mining has not seemed as fringe as it once did. Mining has been around as long as these crytocurrencies have, but only really started to gather the attention of

Lemon Duck brings cryptocurrency miners back into the spotlight

October 13, 2020 10:59

By Vanja Svajcer, with contributions from Caitlin Huey. * We are used to ransomware attacks and big-game hunting making headlines, but there are still methods adversaries use to monetize their efforts in less intrusive ways. * Cisco Talos recently recorded increased activity of the Lemon Duck cryptocurrency-mining botnet using several techniques likely

    • Intelligence Center
    • Intelligence Search
    • Email & Spam Trends
    • Vulnerability Research
    • Vulnerability Reports
    • Microsoft Advisories
    • Incident Response
    • Reactive Services
    • Proactive Services
    • Emergency Support
    • Security Resources
    • Open Source Security Tools
    • Intelligence Categories Reference
    • Secure Endpoint Naming Reference
    • Media
    • Talos Intelligence Blog
    • Threat Source Newsletter
    • Beers with Talos Podcast
    • Talos Takes Podcast
    • Talos Videos
    • Support
    • Support Documentation
    • Company
    • About Talos
    • Careers
    • Cisco Security
Follow us
Cisco

© Cisco Systems, Inc. and/or its affiliates. All rights reserved. View our Privacy Policy.