Feb. 23, 2023, 8:16 a.m. | Mitch Datka - Ron Bolger

Cybersecurity Blog | CrowdStrike provinggrounds.cs.sys

CrowdStrike analyzed an I2Pminer variant that targets macOS The mineware utilizes I2P to hide XMRig network traffic The CrowdStrike Falcon® platform provides continuous protection against mineware threats by offering real-time visibility across workloads CrowdStrike recently analyzed a macOS-targeted mineware campaign that utilized malicious application bundles to deliver open source XMRig cryptomining software and Invisible Internet […]

application campaign continuous crowdstrike crowdstrike falcon cryptomining endpoint & cloud security falcon featured hide internet macos malicious malicious application network network traffic open source platform protection software threats traffic visibility workloads xmrig

More from provinggrounds.cs.sys / Cybersecurity Blog | CrowdStrike

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts