• Proxy and Next-generation firewall (NGFW) architecture comparison
  • In-the-wild RAT and ransomware families
  • Tunneling techniques (ICMP, DNS)
  • Multiple NGFW bypasses
Read Report