The finding of Emotet on your corporate network can mark the beginning of the end, the death knell of your organization’s security, heck, the end of your organization! In no small way, the creators of Emotet have been able to leave their notorious trail of destruction, through their advanced evasion techniques as they continuously work on finding new ways of being persistent and going undetected.
Join us in this webinar, where we explore the research conducted by Deep Instinct on the new wave of Emotet and the evasion techniques that it employs. Our research has shown the advanced use of obfuscation to hide the malicious API calls and the use of benign code to manipulate the algorithm of that sophisticated and expensive AI-based security tool that you may have in place.
Join us in this webinar to gain:
• Critical information on how Emotet works its malicious logic; how it operates and spreads infection
• Knowledge from the experts on how Emotet techniques are modifying to penetrate and stay undetected by many organizational security operations
• Information on how security teams can find the encrypted payload
• Get some tips on how to make your organization more resilient to an Emotet attack