Malware Evasion Techniques
August 2, 2022
Topics
- Malware
- Cybersecurity
- malware analysis
In order to defend our network from malware, we need to have a complete understanding of the methods that APTs and other attackers use to penetrate into our networks. Often, cybersecurity professionals utilize various solutions such as EDR and SIEM as layered security barriers to prevent attackers from gaining access but there are times when even security solutions fail to detect malware and its malicious activities.
Malware these days has become increasingly sophisticated, enabling attackers to bypass a lot of the protections defenders put in place to keep their organizations safe. In today’s blog, we will cover some of the common techniques and APIs that are used by malware and discuss how these techniques are implemented.