Media coverage

DHS releases analysis of ELECTRICFISH malware

Sorry, this post has not been published yet, check again later!

May 10, 2019
Published by:

Infosecurity Magazine

“This type of connection, using a custom protocol instead of existing protocols like HTTP, is what we refer to as hidden tunnels and is used for command and control of remote systems, as well as for data exfiltration,” said Chris Morales, head of security analytics at Vectra.

Read publication

Most recent media coverage

Government to tackle IoT security

November 19, 2019

Information Age

Read more

Government releases first Australian IoT code of practice

November 19, 2019

Which-50

Read more

As government reins in IoT security, recalcitrant mining industry is exposed

November 19, 2019

CSO

Read more