Cybercriminals Fighting Over Cloud Workloads for Cryptomining
This blog details a growing trend of threat actors competing with one another to control hacked clouds and assets—essentially playing a criminal game of Capture the Flag in your infrastructure. To learn more about groups that are doing this, and how to prevent it, please connect with Enterprise Technology International.