Configuration File of Trojan Targets Organization

Digital Shadows helps the IT security manager of a bank discover a configuration file that indicated a banking trojan was targeting their customers. 

Previous Report
6 Considerations When Purchasing Threat Intelligence
6 Considerations When Purchasing Threat Intelligence

When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to asses...

Next Report
Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture
Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog,...

×

Join 150k subscribers and get the latest news & threat intel in your inbox.

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!