×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Analyzing the Raccoon Stealer

May 15, 2020

Raccoon stealer is not the most sophisticated malware that’s available to cyber attackers, but it proves to be quite effective. This reaffirms that attackers do not require anything overly advanced when these less-sophisticated techniques are still very much effective in carrying out an attack. This white paper does a thorough analysis of this specific infostealer, which is a popular tools used by attackers who seek out financial data and personal information.

Previous Flipbook
Securing Privileged Access in Development Environments - Three Critical Use Cases
Securing Privileged Access in Development Environments - Three Critical Use Cases

Helps security leaders understand how to secure development environments. Offers best practices and practi...

Next Flipbook
Five Ways to Strengthen AWS Managed Services Security with CyberArk
Five Ways to Strengthen AWS Managed Services Security with CyberArk

Learn five ways on how CyberArk can help reduce privileged access security risk, improve visibility and con...