Cyberattacks often start with preliminary research on network assets and the people who use them. We'll show you some of the tools attackers use to get information.
A new cryptocurrency miner is attacking Linux servers to co-opt them into a cryptocurrency mining network as well as spreading distributed denial-of-service attacks.