Nov. 1, 2023, 4:13 p.m. | Ram Gall

Wordfence www.wordfence.com

In the first post in this series, we covered common PHP encoding techniques and how they’re used by malware to hide from security analysts and scanners. In today’s post, we’re going to dive a little bit deeper into other obfuscation techniques that make use of other features available in PHP. Obfuscation Redux In the first ...
Read More


The post Know Your Malware Part Two – Hacky Obfuscation Techniques appeared first on Wordfence.

analysts dive encoding features general security hide long read malware obfuscation php scanners security series techniques today wordpress security

More from www.wordfence.com / Wordfence

Information Security Cyber Risk Analyst

@ Intel | USA - AZ - Chandler

Senior Cloud Security Engineer (Fullstack)

@ Grab | Petaling Jaya, Malaysia

Principal Product Security Engineer

@ Oracle | United States

Cybersecurity Strategy Director

@ Proofpoint | Sunnyvale, CA

Information Security Consultant/Auditor

@ Devoteam | Lisboa, Portugal

IT Security Engineer til Netcompany IT Services

@ Netcompany | Copenhagen, Denmark