Poison Ivy and Random Access Tools: What You Need to Know

Poison Ivy and Random Access Tools: What You Need to Know

Cover

While remote access tools (RATs) don’t require much technical knowledge, they can still cause massive damage to your organization. A linchpin of sophisticated cyber-attacks, these deceptively simple maneuvers result in the loss of both data and intellectual property. And unlike malware focused on opportunistic cybercrime, RATs require a live person on the other end to carry out the attacks, meaning other advanced threats might not be far behind.

This informative guide examines one of the most effective and dangerous RATs on the current threat landscape, Poison Ivy (PIVY), and explains which tools and tactics you need to defend yourself against this form of cybercrime. Read now and learn more about how remote access tools might be infiltrating your system.

Vendor:
FireEye
Posted:
05 Mar 2014
Published
31 Dec 2013
Format:
PDF
Length:
32 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy