Ten Ways Hackers Evade the Sandbox

NSS labs recently published an evaluation of seven breach detection systems from FireEye, Cisco Check Point, Fortinet, LastLine and TrendMicro. Not surprisingly, the report shows that five out of the seven products tested missed evasions.

  • Why are attackers getting around these big walls of defense?
  • What are the specific ways signature-based tools and sandbox technologies fail?
  • Can cognitive computing be applied to think like a researcher and act like a hacker?

Download this paper to learn the top ten ways hackers are evading sandbox technologies.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

SlashNext logo
Provided by:
SlashNext
Topic:
Security
Format:
PDF