In today's podcast, we hear how\xa0Lebal\xa0malware steps its way through layered defenses. Cryptocurrency mining campaigns go after\xa0Monero\xa0with\xa0XMRig,\xa0WannaMine, and other toolkits. It's not a victimless crime, either\u2014CPUs can be rendered effectively unusable. Influence operations are tracked in Twitter and Facebook. Dutch intelligence services penetrated Cozy Bear and shared warnings with allied services. Russia demanded, and got, source code access as a condition of doing business.\xa0Dale Drew from CenturyLink shares his outlook on 2018. Stacey Higginbotham, host of the Internet of Things Podcast, chats about IoT security.\xa0A creep exploits password recovery utilities.\xa0\nLearn more about your ad choices. Visit megaphone.fm/adchoices