The Coreflood Trojan is designed to leverage the natural structure of a Windows network for account compromise and data theft. This paper helps organizations determine whether their systems have been infected with the Coreflood Trojan, which is classified as vulnerability-independent malware. The paper also provides guidance about how organizations can determine which strategic mitigations to leverage to minimize and prevent Coreflood Trojan infections.
View Publication

Please share your thoughts.
We recently updated our anonymous product survey; we'd welcome your feedback.