Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

The Top 10 Cyberthreats Right Now

CRN asks technical leaders at Cisco, FireEye and LogPoint what the most pernicious cyberthreats are today and what organizations need to do to avoid becoming a victim.

Back 1   2   3   ... 11 Next


Organizations that fall prey to cryptomining probably left a door open somewhere, raising questions as to what else is in their network, according to Cisco's Williams.

Known, longstanding exploit kits are typically used to carry out cryptomining, Williams said, meaning that businesses that succumb to it have usually had unsecured systems present for a long time. Cryptomining is orders of magnitude more prevalent today than any other type of attack, Williams said, since it can persist for an incredibly long period of time and is nearly risk-free for attackers.

Unlike ransomware—which has a payout rate of between 1 percent and 2 percent—attackers that successfully carry out cryptomining get paid 100 percent of the time, Williams said. Rather than taking the ransomware approach of trying to get an organization to pay a large sum to regain access to a single machine, Williams said cryptomining brings in smaller amounts of money from many, many machines.

Back 1   2   3   ... 11 Next

sponsored resources