When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.
From this session you will:
> Learn how to identify the different evasion techniques that are being used by malware developers.
> Hear about advanced malware that uses different evasion combinations.
> Gain insight on how companies unwittingly contribute to the increased sophistication of evasion techniques.
> Get actionable insights and techniques on how to impede their effectiveness