Developing sophisticated attacks takes time and requires heavy investment. Attackers safeguard their methods by designing malicious software to remain unnoticed for as long as possible.
This webinar recording presented by Lenny Zeltser, VP Product at Minerva and Senior Instructor and Author at SANS Institute, covers:

  • Common evasive techniques used by malware authors
  • Approaches used to turn malware strengths into weaknesses
  • How to protect endpoints from evasive malware without relying on signatures, behavioral patterns or machine learning models