cryptocurrency

cryptocurrency

Oct 112018

Cryptojacking & Blockchain

Exploiting the ecosystem around cryptocurrencies has become big business for cybercriminals. During the past few years, cybersecurity firms and observers have noted a spike in everything from phishing scams targeting e-wallet credentials to targeting the initial coin offerings (ICO) that serve as crowdfunding for many companies.   Cryptojacking  Adding to this list of challenges is cryptojacking. […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Jun 282018

Mid-Year Cybersecurity Threat Update

| Senior Threat Intel Analyst

The cybersecurity underground is not stagnant. Attackers are continuously innovating to find new ways to make money and exploit any weaknesses available.   When we released the Black Market Report in March, the Armor Threat Resistance Unit (TRU) research team  revealed the varying costs of personal data in the underground, as well as the thriving market for cybercrime-as-a-service. Throughout the first half of 2018  though, other trends have emerged. Most notably, the increasing interest […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.