Analyzing the Raccoon Stealer

May 15, 2020

Raccoon stealer is not the most sophisticated malware that’s available to cyber attackers, but it proves to be quite effective. This reaffirms that attackers do not require anything overly advanced when these less-sophisticated techniques are still very much effective in carrying out an attack. This white paper does a thorough analysis of this specific infostealer, which is a popular tools used by attackers who seek out financial data and personal information.

Previous Article
SecureIT Achieves a Frictionless Approach to Endpoint Protection with CyberArk EPM
SecureIT Achieves a Frictionless Approach to Endpoint Protection with CyberArk EPM

In just 3 months, a major Financial Institution leveraged CyberArk EPM to remove all local admin rights wit...

Next Article
Five Ways to Strengthen AWS Managed Services Security with CyberArk
Five Ways to Strengthen AWS Managed Services Security with CyberArk

Learn five ways on how CyberArk can help reduce privileged access security risk, improve visibility and con...