Attackers Employ Sneaky New Method to Control Trojans

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Watchdog
    PCHF Bot
    • Apr 2016
    • 19188

    #1

    Attackers Employ Sneaky New Method to Control Trojans

    A new malware sample shows threat actors have begun using DNS TXT record and queries for C2 communications, Cisco Talos says,

    Continue reading…
Working...