Configuration File of Trojan Targets Organization

Digital Shadows helps the IT security manager of a bank discover a configuration file that indicated a banking trojan was targeting their customers. 

Previous Report
6 Considerations When Purchasing Threat Intelligence
6 Considerations When Purchasing Threat Intelligence

When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to asses...

Next Post
Blog | Trust vs Access: A Tale of Two Vulnerability Classes
Blog | Trust vs Access: A Tale of Two Vulnerability Classes

It’s been a big week in cyberspace, with high profile crypto vulnerabilities KRACK (affecting WPA2) and ROC...

×

Join 150k subscribers and get the latest news & threat intel in your inbox.

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!