Ten Ways Hackers Evade the Sandbox

NSS labs recently published an evaluation of seven breach detection systems from FireEye, Cisco Check Point, Fortinet, LastLine and TrendMicro. Not surprisingly, the report shows that five out of the seven products tested missed evasions.

  • Why are attackers getting around these big walls of defense?
  • What are the specific ways signature-based tools and sandbox technologies fail?
  • Can cognitive computing be applied to think like a researcher and act like a hacker?

Download this paper to learn the top ten ways hackers are evading sandbox technologies.

Resource Details

SlashNext logo
Provided by: