Get a Pentest and security assessment of your IT network.

News

Catching a RAT by the tail

Last month I examined how machine learning could be used to detect low and slow insider threats. In this, the final installment of my trilogy on real-world use cases from the recent Verizon Data Breach Digest, Ill discuss how remote access threats can be exposed with machine learning techniques. The Identity Theft Resource Center (ITRC) has been tracking security breaches since 2005, looking for patterns, new trends and information to educate businesses and consumers on the importance of protecting identities. In addition to monitoring how identities are being used and managed, other critical data sources within an organizations computing environment should be examined to provide more context beyond who and what.”]

Source: https://www.csoonline.com/article/3086965/remote-access-threats.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks