![]() ![]() Here are some of the highlights from our conversation:Ī: Adversaries have been using non-Portable Executable (PE) files like office documents and PDFs embedded with either malicious links or actual malicious active content as delivery vehicles to launch targeted attacks. ![]() Security Admins would have to find and delete every copy of these files or ask end users to not open the document neither of these is a reliable or scalable solution. 14.3 RU1 offers a reliable and easy-to-use method in which administrators can now proactively block malicious non-PE files using hash, size and other parameters.Īdditionally over the past few years, Symantec has observed a shift in the threat landscape towards targeted attacks utilizing increasingly sophisticated techniques. These include a wide range of living-off-the-land tactics with attackers taking advantage of native applications, tools and services already present on targeted systems. This allows the attackers to achieve their goals without needing to create and deploy their own binary files on disk- operating fileless, so to speak-or to blend in with the daily work of a system administrator who uses the same dual-use tools.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |