Cyber Attack Evasion Techniques

Logo
Presented by

Guy Propper, Eric Bruno

About this talk

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems. From this session you will: > Learn how to identify the different evasion techniques that are being used by malware developers. > Hear about advanced malware that uses different evasion combinations. > Gain insight on how companies unwittingly contribute to the increased sophistication of evasion techniques. > Get actionable insights and techniques on how to impede their effectiveness
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (48)
Subscribers (4535)
Deep Instinct, the first and only zero-day data security company built on a deep learning cybersecurity framework, prevents unknown threats in <20 milliseconds, 750X faster than the fastest ransomware can encrypt. Deep Instinct Data Security X (DSX) secures data at-rest or in-motion – across cloud, NAS, applications, and endpoints.