Skip to content ↓ | Skip to navigation ↓

Shape Security recently found a new strain of malware that executes a unique command and control attack. While these attacks are common, this one hides in unsent Gmail drafts, making it surprisingly difficult to detect.

Will similar command and control evasion techniques target other unassuming programs?

Listen to our latest security slice podcast and hear Tim Erlin, Lamar Bailey and Craig Young discuss how these attacks are similar to insider threats and the two programs most likely to be targets for these strategies.

 

 CLICK HERE TO LISTEN TO THE PODCAST

 

MORE PODCASTS

RESOURCES:

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock