Our growing dependence on technology, connectivity and data means that businesses present a bigger attack surface than ever. Targeted attackers have become more adept at exploiting their victimsrsquo; vulnerabilities to penetrate corporate defences while ‘flying under the radarrsquo;.
Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companiesrsquo; business processes suffer because data processing speeds fall substantially.