Dropper

November 14, 2019

THREAT RESEARCH

Custom dropper hide and seek

Most users assume they are safe when surfing the web on a daily basis. But information-stealing malware can operate in the background of infected systems, looking to steal users’ passwords, track their habits online and hijack personal information. Cisco Talos has monitored adversaries which a…

August 28, 2019

THREAT RESEARCH

RAT Ratatouille – Backdooring PCs with leaked RATs

Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in 2016, various adversaries used RevengeRAT to attack organizations and individuals around the world. The source code associated with RevengeRAT was previously r…

August 5, 2019

PARTNER

4 Truths About ABM that You Must Know

Account-based marketing is a growing. According to Terminus, more than 60% of companies plan to launch ABM- based campaigns within the next year. ABM’s reliance and subsequent progress is warranted. A whopping 97% of marketers say ABM has a higher ROI than other marketing activities. Not to mention…