Abracadabra of Malwares: Obfuscation

December 16, 2019

Threat actors have access to all the security products, white papers and they even know how the internals of operating systems work. With all these crafts, information and tricks in hand they obfuscate the key components of malicious code to bypass security and antivirus systems. This webinar focuses on how obfuscation is used in malwares, types of obfuscation and how new age malwares carry obfuscated content that delays reversing process. 

Previous Video
Punycode: Awareness and Protection
Punycode: Awareness and Protection

This session covers the importance of DNS, a critical component of the Internet and how it's used to identi...

Next Video
Threat Spotlight: Emotet
Threat Spotlight: Emotet

It’s been five years since the discovery of Emotet yet it’s still making a buzz. Join us for a short histo...