Protecting against crypto mining and malware

By Claudia Martinez It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious

Source:: Cisco Security Notice