This resource is no longer available

Cover Image

While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure.

A Remote Access Trojan (RAT) is a very common tool used by many criminal groups and individuals across the world. This tool is often considered to be malware, but its functionality can be used for legitimate purposes.

In this hunting guide, discover ways you can seek out threats using threat investigation tools.

Vendor:
DomainTools
Posted:
Nov 18, 2021
Published:
Feb 6, 2020
Format:
PDF
Type:
White Paper

This resource is no longer available.