command and control evasion

Results 1 - 1 of 1Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Nov 17, 2014
Todayís malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether itís changing their attacks or hiding malicious code within web pages, itís more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against todayís threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet todayís threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic
Already a subscriber? Log in here
Please note you must now log in with your email address and password.