Star 0

Abstract

The stealthy delivery of Malware exists at the center of today’s advanced attacks. In order for these malicious applications to succeed, they must pass under the watchful eyes of security teams when making their entrance, and attempt to persist within an organization for days, months or longer. Join Palo Alto Networks for the latest in threat research on how Malware compromises, spreads and attempts to avoid analysis. We will focus on real-world tear downs, evasions and obfuscation methods that reveal the intent and tactics behind sophisticated Malware.