Dropper
Custom dropper hide and seek
1 min read
Most users assume they are safe when surfing the web on a daily basis. But information-stealing malware can operate in the background of infected systems, looking to steal users’ passwords, track their habits online and hijack personal information. Cisco Talos has monitored adversaries which are behind a wave of ongoing campaigns dropping well-known information-stealer like […]
RAT Ratatouille – Backdooring PCs with leaked RATs
1 min read
Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in 2016, various adversaries used RevengeRAT to...
4 Truths About ABM that You Must Know
4 min read
Account-based marketing is growing, but many still perceive it as a buzz word. Here are 4 ABM truths that will help you understand how to sort through the hype.