This post was authored by Ben Baker and Alex Chiu . Executive Summary Threat actors and security researchers are constantly looking for ways to better detect and evade each other. As researchers have become more adept and efficient at malware analysis, malware authors have made an effort to build more evasive samples. Better static, dynamic, and automated analysis tools have made it more difficult for attackers to remain undetected. As a result, attackers have been forced to find methods to evade these tools and [...]
from Cisco Blog » Security http://ift.tt/1OU7Hna
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.