Flying Under the Radar – Security Evasion Techniques

Cyber Security Master Class: Episode 18

“This is out of scope,” said no hacker ever. Cybercriminals relentlessly aim to breach systems and stay undetected during an attack. In our latest Cybersecurity Masterclass, Cato experts dive into the evolving tactics of threat actors running malware and phishing campaigns, exploring how they evade security tools and researchers.  

We’ll examine the old-school tricks that laid the foundation for today’s sophisticated tactics and examine the modern techniques bad actors use to outsmart defenses, including detailed demonstrations of how they now exploit cloud services and AI. 

Join Etay Maor, Chief Security Strategist, and Tal Darsan, Manager of Cybersecurity Services at Cato Networks, and both members of the Cato CTRL team, to learn: 

  • Early phishing and malware evasion techniques like verification of credit cards, anti-research methods, proxy checks, and randomized folders 
  • Modern phishing and evasion strategies, including obfuscated kits, reverse proxy attacks, and randomized URL attributes 
  • How threat actors leverage cloud services and AI for evasion, with real-world examples 
  • Steps to detect and mitigate attacks and strategies to reduce your attack surface and strengthen your security posture 

Presented by

img

Tal Darsan

Security Services Manager

Cato Networks

 

img

Etay Maor

Chief Security Strategist

Cato Networks