Media coverage

DHS releases analysis of ELECTRICFISH malware

Sorry, this post has not been published yet, check again later!

May 10, 2019
Published by:

Infosecurity Magazine

“This type of connection, using a custom protocol instead of existing protocols like HTTP, is what we refer to as hidden tunnels and is used for command and control of remote systems, as well as for data exfiltration,” said Chris Morales, head of security analytics at Vectra.

Read publication

Most recent media coverage

How Organizations Can Do Their Part And Be CyberSmart Beyond National Cyber Security Awareness Month

October 20, 2020

AIThority

Read more

Barnes & Noble gets hacked; notifies customers of possible data breach

October 16, 2020

Security Week

Read more

Comment les cybers attaquants exploitent Microsoft 365 pour s’emparer des données des entreprises?

October 16, 2020

IT for Business

Read more