Remove Antivirus Remove Data collection Remove Media Remove Threat Reports
article thumbnail

Good game, well played: an overview of gaming-related cyberthreats in 2022

SecureList

Once executed on the attacked system, RedLine Stealer collects system information, including device user names, the operating system type, and information about the hardware, installed browsers, and antivirus solutions. The scheme encourages users to log in using their social media credentials.

Mobile 96
article thumbnail

Top Threat Intelligence Platforms for 2021

eSecurity Planet

Threat Indicator Confidence scoring tool. Collections repository. ThreatConnect’s platform enables automated data collection from all sources and presents it to users in context. Threat report export capabilities. Crowdsourced analytics show threat prevalence. IntSights Threat Intelligence Platform.