Obtain full enterprise visibility by ingesting more than just logs, events and alerts, also add context, device, user, application, network and enrichment data easily with REST API and pre-configured integrations.
Immediately identify segmented threats with the full forensics details encapsulated within a JASK Insight™ that includes context the analyst can determine if it needs immediate action.
Kodi add-ons found to contain Windows and Linux cryptomining malware
Rod Soto, director of security research at JASK, told SiliconANGLE that “this is an interesting attack vector as the Kodi media player is usually present across many platforms – from computers to other IoT devices.”
Developer moving into management? Ask these 10 questions first
Shifting from a technical position to a management position can be a radical change. Here’s how to determine if it’s the right move for you.
Monero miner found in third-party Kodi add-ons for Linux and Windows
Rod Soto, director of security research at JASK, described the campaign as a great example of cybercriminals’ creativity.
Watch a 5 minute video about JASK’s AI powered security operations platform.
Browse through 6 most important features of the JASK’s ASOC platform.
Join a live Product webinar with your peers. 30 min every Wed at 11 PST.
Schedule your one-on-one product demo with our expert Sales Engineer.