Dark Reading
Infosecurity
After attackers successfully access the system, they can start mining for Monero, most likely chosen “because it is designed to mine common CPUs present in every laptop and desktop where most cryptomining relies on expensive GPUs,” says Chris Morales, head of security analytics at Vectra.
Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’
Channel Futures