Welcome to our new series: interview with a malware hunter. In these Q&A sessions, we’ll take you behind the scenes to get to know our malware intelligence crew. Without further ado, we present our first victim, researcher, and blogger Pieter Arntz.
Welcome to our new series: interview with a malware hunter. In these Q&A sessions, we’ll take you behind the scenes to get to know our malware intelligence crew. Without further ado, we present our first victim, researcher, and blogger Pieter Arntz.
There are times when I really, really miss Steve Jobs. Say what you will about him, he more or less kept Apple out of the political fray, and that’s more than can be said for current CEO Tim Cook. Cook recently did an interview with The Telegraph and made some very chilling comments about the […]
TU-SO further elaborated that in the past year “the threat actors accessed the target environment using compromised credentials and the companies’ own virtual private network (VPN) or other remote access solutions.” The research team also noted that threat actors were “living off the land,” using credentials, systems and tools they collected along the way instead […]
Latest Comments