c
April 25, 2023, 1:34 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by CrowdStrike on February 23, 2023. CrowdStrike analyzed an I2Pminer variant that targets macOSThe mineware utilizes I2P to hide XMRig network trafficCrowdStrike recently analyzed a macOS-targeted mineware campaign that utilized malicious application bundles to deliver open source XMRig cryptomining software and Invisible Internet Protocol (I2P) network tooling. Research began after identifying suspicious multi-architecture binaries within a public malware repository. An...

application architecture campaign crowdstrike cryptomining february hide internet macos malicious malicious application network open source protocol research software tooling xmrig

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts