Read this exclusive research report to learn about:

  • Social engineering techniques never seen before
  • Enabling “God mode” to spread PlugX backdoor
  • Using DNS query protocol to mask C2 communications
  • Threat intelligence you can use to harden perimeter security

Untitled-1