Having previously decided we need to make a new hire onto our team, part 1 of this series examined how to meet the needs of our team going into the future, instead of just adding surface visible technical skills.
See how doxxing victims are distributed across industries, company sizes,
and revenue tiers. Find Coveware’s data and analysis on doxxing trends in
Q4.
A recent piece of malware from a known crypto mining botnet campaign has started leveraging Bitcoin blockchain transactions in order to hide its backup C2 IP address. It's a simple, yet effective, way to defeat takedown attempts.