Cyber Attack Evasion Techniques

Logo
Presented by

Guy Propper, Eric Bruno

About this talk

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems. From this session you will: > Learn how to identify the different evasion techniques that are being used by malware developers. > Hear about advanced malware that uses different evasion combinations. > Gain insight on how companies unwittingly contribute to the increased sophistication of evasion techniques. > Get actionable insights and techniques on how to impede their effectiveness
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (45)
Subscribers (4091)
The Deep Instinct Prevention Platform stops never before seen, unknown threats with the highest accuracy and lowest false positive rate to stop attacks before they can detonate and wreak havoc.