POS Malware Continues to Evolve
- Michael Trotter-Lawson
- Nov 12, 2014
- 1 min read
There is no time to rest when it comes to defending against these types of threats. I believe it is imperative to build and maintain a list of hashes associated with these attacks and alert through SIEM, IPS and FIM as effectively as possible.