This resource is no longer available
Poison Ivy: Assessing Damage and Extracting Intelligence
While remote access tools (RATs) require little technical savvy, they can still cause massive damage to your organization. A linchpin of sophisticated cyber-attacks, these deceptively simple maneuvers result in the loss of both data and intellectual property. And unlike malware focused on opportunistic cybercrime, RATs require a live person on the other end to carry out the attacks.
This guide examines one of the most effective and dangerous RATs, Poison Ivy (PIVY), against the current threat landscape, and addresses which tools you need to defend yourself against this form of cybercrime.
Read now and learn how remote access tools are being used to infiltrate your system.