Media coverage

DHS releases analysis of ELECTRICFISH malware

Sorry, this post has not been published yet, check again later!

May 10, 2019
Published by:

Infosecurity Magazine

“This type of connection, using a custom protocol instead of existing protocols like HTTP, is what we refer to as hidden tunnels and is used for command and control of remote systems, as well as for data exfiltration,” said Chris Morales, head of security analytics at Vectra.

Read publication

Most recent media coverage

Industry reactions to crypto vulnerability found by NSA: Feedback Friday

January 17, 2020

Security Week

Read more

NSA Windows 10 security disclosure raises questions

January 15, 2020

Computer Weekly

Read more

NSA hands serious flaw to Microsoft rather than use it

January 15, 2020

ITPro

Read more