CyberSecurity Summary

Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats


Listen Later

Focuses on understanding and counteracting evasive malware. It begins by introducing code analysis techniques to identify malicious intent. The material then details how malware employs context awareness to avoid detection in virtual environments and how it utilizes anti-reversing tactics like anti-disassembly and debugging interference. Further sections cover defense evasion strategies, including process injection and rootkits, and explores fileless malware. Finally, the text examines how malware uses encoding, encryption, and obfuscation to hide its malicious components.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Evasive-Malware-Understanding-Deceptive-Self-Defending-ebook/dp/B0C1YGWP76?&linkCode=ll1&tag=cvthunderx-20&linkId=faed0fc61f3b0db04a0353f61ffe2519&language=en_US&ref_=as_li_ss_tl
...more
View all episodesView all episodes
Download on the App Store

CyberSecurity SummaryBy CyberSecurity Summary