What Hackers use to Cloak Advanced Persistent Threats

  • Fecha:9 de julio de 2014
  • Tipo de evento: Webcast bajo demanda
  • Ubicación:Online

Advanced evasion techniques (AETs) work with advanced persistent threats (APTs) to disguise cyber-attacks in order to avoid detection and blocking by information security systems. AETs enable cybercriminals to deliver malicious content to a vulnerable system, avoiding detection that would normally stop the threat.

In this webcast, learn how network security systems are ineffective against AETs in the same way a stealth fighter can attack without detection by radar or other similar defensive systems.