Feb. 7, 2022, 11:11 a.m. | Alexey Bukhteyev

Check Point Research research.checkpoint.com

Research By: Alexey Bukhteyev Malware uses sandbox evasion techniques to avoid exposing its malicious behavior inside a sandbox and thus prevent detection. Figure 1 – Sandbox evasion techniques. Common evasion techniques include the use of specific assembly instructions, and looking for specific registry keys  or file names. Such evasion techniques can be easily discovered by... Click to Read More


The post Invisible Sandbox Evasion appeared first on Check Point Research.

cape check point research publications cuckoo evasion hooking sandbox searchable

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Officer Level 1 (L1)

@ NTT DATA | Virginia, United States of America

Alternance - Analyste VOC - Cybersécurité - Île-De-France

@ Sopra Steria | Courbevoie, France

Senior Security Researcher, SIEM

@ Huntress | Remote US or Remote CAN

Cyber Security Engineer Lead

@ ASSYSTEM | Bridgwater, United Kingdom