The Case of the Unexplained FTP Connections
October 30th, 2012
No comments
A key part of any cybersecurity plan is “continuous monitoring”, or enabling auditing and monitoring throughout a network environment and configuring automated analysis of the resulting logs to identify anomalous behaviors that merit investigation. This…(read more)
Categories: malware, operation desolation, process monitor, Trojan Horse, Zero Day