Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks
At every turn, the info-stealer uses legitimate services to get around normal email, endpoint and network defenses. Continue reading Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks