March 20, 2023, 1 p.m. | Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes

Unit42 unit42.paloaltonetworks.com

Techniques such as dependency emulation and analysis of encrypted network traffic can help detect malware samples that would not normally execute in a sandbox environment.


The post Tailoring Sandbox Techniques to Hidden Threats appeared first on Unit 42.

advanced wildfire analysis dependency detect detect malware emulation encrypted environment evasion hidden malware memory detection network network traffic sandbox sandbox evasion techniques threats traffic unit 42 wildfire wireshark

More from unit42.paloaltonetworks.com / Unit42

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)