November 14, 2019


Custom dropper hide and seek

1 min read

Most users assume they are safe when surfing the web on a daily basis. But information-stealing malware can operate in the background of infected systems, looking to steal users’ passwords, track their habits online and hijack personal information. Cisco Talos has monitored adversaries which are behind a wave of ongoing campaigns dropping well-known information-stealer like […]

August 28, 2019


RAT Ratatouille – Backdooring PCs with leaked RATs

1 min read

Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in 2016, various adversaries used RevengeRAT to...

August 5, 2019


4 Truths About ABM that You Must Know

4 min read

Account-based marketing is growing, but many still perceive it as a buzz word. Here are 4 ABM truths that will help you understand how to sort through the hype.