Evasive Security Threats: How Well Do You Know Your Adversary?

Eila Shargh


Malicious actors are more resourceful than ever. They have learned the different techniques and processes used for malware analysis, and have created threats that can evade detection by traditional tools such as antivirus. Sun Tzu’s “The Art of War” states: “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” With this in mind, protecting your organization requires both a foundational understanding of highly evasive threats and an updated methodology for malware detection.

Below are links to a few educational resources to equip security teams with greater knowledge about evasive threats and how to prevent them.

Register for Ignite ’17 Security Conference
Vancouver, BC June 12–15, 2017

Ignite ’17 Security Conference is a live, four-day conference designed for today’s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the Ignite website for more information on tracks, workshops and marquee sessions.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42


SUBSCRIBE TO RSS