First Draft
Published in

First Draft

Desktop screen saver of mountainous skyline.
Photo by PolaroMagnet on Unsplash

“Windows and Linux devices are under attack by a new Crypto-mining worm”

Author: Dan Gooidin | Publication:

This article is about the signature tells of a new computer worm that takes control of unused processing resources to perform malicious activity. Several parallels to Stuntex seem available, one question I had while reading- ‘What if the next ‘pandemic’ isn’t biological, what if it’s digital?” There is a lot of discussion about ‘infrastructure’, however moving forward a national digital infrastructure bill will be needed to ensure that the digital economy does not suffer from processing freezes or outages due to the increasingly sophisticated nature of recent malware campaigns.

Link to article:




Updated every Sunday.

Recommended from Medium

Find & Hack Vulnerable Databases With Shodan!

Register Metamask Wallet

Why Cyber Hygiene is More Important Than Ever

CIS Controls v8 Overview- Control 01

HALO Network — May 2022 — Week 3 Report

Top 4 Benefits of Ephemeral Messaging for Security Professionals

About SafeWorld

Fearing Patchwork Privacy Laws, Tech Industry Calls for Federal Regulation

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jon Walsh

Jon Walsh

I am the Tiger

More from Medium

Day 6: Finally a turn around

How Autonomous Cars Already Help Us Mitigate Climate Change

25 𝐏𝐫𝐞𝐝𝐢𝐜𝐭𝐢𝐨𝐧𝐬 𝐟𝐨𝐫 𝐓𝐡𝐞 𝐍𝐞𝐱𝐭 25 𝐘𝐞𝐚𝐫𝐬: 𝐓𝐞𝐜𝐡 & 𝐒𝐨𝐜𝐢𝐞𝐭𝐲

Why ModelOps is an enterprise-level capability under the CIO’s accountability