Posted on
in Presentations
The birth of crypto has changed the threat landscape making it easier for malicious actors to get paid and remain anonymous. The days of ransomware are not over, but the more ominous threats facing us now are cryptojacking, miners and phishing. With the rocketing crypto market cap soaring up to $835 billion this year—the name of the game is computing power and actors are using your environment.
Learning Objectives:
1: Understand why cryptojacking is happening in corporate environments and indicators of compromise.
2: Learn preventative measures and how to remediate if actors have compromised your environment.
3: Learn how to secure cloud computing resources and protect against malicious JS injections
Learning Objectives:
1: Understand why cryptojacking is happening in corporate environments and indicators of compromise.
2: Learn preventative measures and how to remediate if actors have compromised your environment.
3: Learn how to secure cloud computing resources and protect against malicious JS injections
Share With Your Community