Security News > 2023 > February > How to Detect New Threats via Suspicious Activities

How to Detect New Threats via Suspicious Activities
2023-02-20 11:02

Find out how to avoid these circumstances and detect unknown malicious behavior efficiently.

Malware developers use polymorphism, which enables them to modify the malicious code to generate unique variants of the same malware.

Malware authors may use a "Low and slow" approach, which involves sending a small amount of malicious code across a network over a long time, which makes it harder to detect and block.

When analyzing known malware families, researchers can take advantage of existing information about the malware, such as its behavior, payloads, and known vulnerabilities, in order to detect and respond to it.

Even if the malware family is not detected - we can always conclude the threat's functionality by considering its behavior.

Behavior analysis enhances your ability to respond to new and unknown threats and strengthens your organization's protection without additional costs.


News URL

https://thehackernews.com/2023/02/how-to-detect-new-threats-via.html