Hot Knives Through Butter: Evading File-Based Sandboxes

Hot Knives Through Butter: Evading File-Based Sandboxes

Cover

Many IT departments are utilizing a new security tool called file sandboxing, which allows you to spot malicious code via isolated, virtual environments. The only problem is that by itself, this solution can only monitor and report on file activity, not analyze it.

This in-depth guide explores this security challenge, and how failing to address it can leave your systems just as vulnerable as they were before – this time to a range of sandbox-evasion techniques.  Read now for critical information on detecting these malware attacks, and how by utilizing both sandboxing and analysis tools in harmony, you can bring your threat protection strategy to the next level.

Vendor:
FireEye
Posted:
04 Mar 2014
Published:
28 Feb 2014
Format:
PDF
Length:
21 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy