Glupteba: A Guided Tour

This white paper aims to provide an in-depth analysis of a Glupteba sample performed by Nozomi Networks Labs, shedding light on its functionality and evolution. In addition to our analysis of the malware, we also outline indicators of compromise, enabling readers to identify signs of the malware’s presence in order to be able to take defensive actions.

View Resource

Speakers

Glupteba: A Guided Tour
White Papers

Glupteba: A Guided Tour

December 17, 2024

This white paper aims to provide an in-depth analysis of a Glupteba sample performed by Nozomi Networks Labs, shedding light on its functionality and evolution. In addition to our analysis of the malware, we also outline indicators of compromise, enabling readers to identify signs of the malware’s presence in order to be able to take defensive actions.

This white paper aims to provide an in-depth analysis of a Glupteba sample performed by Nozomi Networks Labs, shedding light on its functionality and evolution. In addition to our analysis of the malware, we also outline indicators of compromise, enabling readers to identify signs of the malware’s presence in order to be able to take defensive actions.

SPEAKERS

This white paper aims to provide an in-depth analysis of a Glupteba sample performed by Nozomi Networks Labs, shedding light on its functionality and evolution. In addition to our analysis of the malware, we also outline indicators of compromise, enabling readers to identify signs of the malware’s presence in order to be able to take defensive actions.

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

Glupteba: A Guided Tour

This white paper aims to provide an in-depth analysis of a Glupteba sample performed by Nozomi Networks Labs, shedding light on its functionality and evolution. In addition to our analysis of the malware, we also outline indicators of compromise, enabling readers to identify signs of the malware’s presence in order to be able to take defensive actions.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.