Skip to content ↓ | Skip to navigation ↓

Shape Security recently found a new strain of malware that executes a unique command and control attack. While these attacks are common, this one hides in unsent Gmail drafts, making it surprisingly difficult to detect.

Will similar command and control evasion techniques target other unassuming programs?

Listen to our latest security slice podcast and hear Tim Erlin, Lamar Bailey and Craig Young discuss how these attacks are similar to insider threats and the two programs most likely to be targets for these strategies.

 

 CLICK HERE TO LISTEN TO THE PODCAST

 

MORE PODCASTS

RESOURCES:

picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service  for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Shellshock and Heartbleed vulnerability.

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock