Unveiling the Shadow: Advanced Evasion Techniques in APT Operations
On a world that is becoming more interconnected and digitized, cybersecurity has become a top priority for organizations. However, as defense technologies evolve, so do the tactics used by adversaries. The techniques used by advanced threat actors (APTs) to evade implemented countermeasures will be explored through analysis of different adversaries and examples covering everything from obfuscation strategies, dynamic API resolution, API hashing, and direct and indirect system calls. Join us in this analysis and discover how to face the new challenges raised by adversaries to protect the organization in a constantly evolving digital world.