Modern Adversaries and Evasion Techniques: Why Legacy AV Is an Easy Target
While legacy AV solutions do their job to a certain extent, adversaries have evolved to evade those solutions. Injecting code into processes and subverting trust controls are only a couple of the evasion techniques that adversaries are successfully using. Fueled by the threat intelligence, this eBook provides you insights on actual evasion use cases.
Download the eBook to:
- Learn about 7 defense evasion techniques that legacy AV can’t stop.
- Meet adversaries like MALLARD SPIDER, SCATTERED SPIDER and more who had success using evasion techniques.
- Gain insights from these use cases, like what they did and when, and what can help the situation.