Focuses on understanding and counteracting evasive malware. It begins by introducing code analysis techniques to identify malicious intent. The material then details how malware employs context awareness to avoid detection in virtual environments and how it utilizes anti-reversing tactics like anti-disassembly and debugging interference. Further sections cover defense evasion strategies, including process injection and rootkits, and explores fileless malware. Finally, the text examines how malware uses encoding, encryption, and obfuscation to hide its malicious components.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Evasive-Malware-Understanding-Deceptive-Self-Defending-ebook/dp/B0C1YGWP76?&linkCode=ll1&tag=cvthunderx-20&linkId=faed0fc61f3b0db04a0353f61ffe2519&language=en_US&ref_=as_li_ss_tl
Published on 1 week ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate