Custom, targeted malware attacks demand new malware defense approach
Not long ago, an IT security analyst at a major southeast U.S.-based distributor of electronic
components spotted some peculiar network activity. The analyst had been evaluating Netflow
network traffic data and identified