Analysis of Remote Access Trojans helps understand third-party business risk

Remote Access Trojans (RATs) are often used to steal information from enterprise networks. By looking at network metadata, analysts at threat intelligence firm Recorded Future have been able to identify RAT command-and-control (C2) servers, and more crucially, which corporate networks are communicating to those controllers.

Read full news article on BetaNews

 


Date:

Categorie(s):