This resource is no longer available
Hot Knives Through Butter: Evading File-Based Sandboxes
To combat today’s advanced threats, many IT departments are turning to file sandboxing, which allows you to spot malicious code via isolated, virtual environments. But by itself, this solution can only monitor and report on file activity, not analyze it. And the analysis IT professionals must perform is getting harder every day due to a range of sandbox-evasion techniques.
This in-depth guide explores this security challenge and gives you detailed information on each common evasion technique. Read on to learn how to detect these evasion strategies and to prevent them from compromising your security.