Exposing the Google Drive Remote Access Trojan

Read this exclusive research report to learn about:

  • Google Drive malware’s unique evasion techniques
  • Linkage between IXESHE campaign and Google Drive malware
  • In-depth analysis of malware tactics, techniques and procedures
  • Threat intelligence you can use to harden perimeter security

From time-to-time Verint (and its subsidiaries) would like to share information relating to future events, surveys about Verint, webinars, industry best practice and thought leadership with you. If you are happy for us to contact you please let us know how you would like us to contact you by confirming below:

I am happy to receive communications from Verint by email.

I am happy to be contacted by Verint by telephone.

Verint is committed to treat and protect your personal data in accordance with our Privacy Policy.