Our mobile, social, and collaborative lifestyles have transformed the way we use technology at home, at work, and everywhere in between. We want – and need – to secure our devices, personal information, and business data; to keep our families safe online, and our employees productive; to take advantage of all that new technologies can offer us while minimizing the risk.
Our engineers were investigating a case involving a targeted attack when they came across a custom tool called vtask.exe. Once executed, vtask.exe hides Windows tasks in the current session. What’s curious about this attacker-created tool is that it appears to have been compiled in 2002—twelve … [read post]