Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
But new details of the hack emerge, as regulators consider vendor regulations.
A new variant has been tweaked with a domain generation algorithm (DGA) to avoid traffic detection.
Collaboration beyond sharing malware samples is the goal.
Espionage malware has persisted in embassies and state offices for at least four years.
CrowdStrike, ForeScout and ThreatStream are rolling out new initiatives to stay ahead of the criminals.
The malware uses the Tor anonymity network to attack its victims.