THREAT

Detect and Prevent Threats

 

Fileless malware and “living off the land” have been around for some time, but have seen a resurgence in recent months. What’s behind this growing popularity? Jen Miller Osborn, Deputy Director of Threat Intelligence of Unit 42 explains what makes these tactics so attractive to malicious actors.

3 min read

For many, the cryptocurrency phenomenon is intriguing but complicated, involving “blockchain,” “distributed ledgers” and other jargon. Ryan Olson, VP of Threat Intelligence Unit 42, explains one of the hidden threats of the cryptocurrency boom — cryptomining attacks.

3 min read

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.

3 min read