Shape Security recently found a new strain of malware that executes a unique command and control attack. While these attacks are common, this one hides in unsent Gmail drafts, making it surprisingly difficult to detect.
Will similar command and control evasion techniques target other unassuming programs?
Listen to our latest security slice podcast and hear Tim Erlin, Lamar Bailey and Craig Young discuss how these attacks are similar to insider threats and the two programs most likely to be targets for these strategies.
CLICK HERE TO LISTEN TO THE PODCAST
- Security Slice: Hacker Halted
- Security Slice: Internet Privacy Realities
- Security Slice: Banking on Cybersecurity
- Security Slice: Patching the Patch
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock