Detecting and Containing IRC-Controlled Trojans: When Firewalls, AV, and IDS Are Not Enough

by Corey Merchant Sept. 1, 2017 via Symantec

This paper discusses IRC-based trojans as a distinctly underestimated class of malicious activity, and how real time security event monitoring is the key to identifying and containing similar compromises. It discusses the general methodology used to discover, track, and stop such malicious activity by presenting a real-world case study.

2flash 3 days, 12 hours ago

Complex and bold. This article truly is one of the reason I come back to SecurityDocs :)