RMRF TechnologySeven Deadly Sins of Corporate CybersecurityThe most of employees have at least once violated corporate information security. In the most of cases there were intended violations…Jan 3, 2019Jan 3, 2019
RMRF TechnologyRevealing some Details about ShadowThreat. Initial IntrusionIn our previous article we described an overall schema of behavioural the ShadowThreat according to APT phases. After this publication RMRF…Mar 27, 2018Mar 27, 2018
RMRF TechnologyNew Cyberthreat Replaces Operating System with a “Fake”. Part 1As we mentioned in our previous article, RMRF Technology faced with very complex attack in its latest investigations. The way of injection…Feb 22, 2018Feb 22, 2018
RMRF TechnologyНовая киберугроза подменяет операционную систему на “фальшивку”Злоумышленники получают полный доступ к данным пользователей, а также неограниченные права для администрирования заражённых устройств.Feb 19, 20181Feb 19, 20181
RMRF TechnologyNew Cyberthreat Replaces Operating System with a “Fake”. IntroThreat actors get full access to users’ data and unlimited rights for infected devices administration.Feb 19, 2018Feb 19, 2018
RMRF TechnologyUkrainian cybersecurity company RMRF Technology became a security advisor of international…Ukrainian company RMRF Technology, which specializes on providing cybersecurity services and development of deception-based solutions…Feb 15, 2018Feb 15, 2018