Aug. 9, 2023, 5:55 p.m. | Devon Griffith

System Weakness - Medium systemweakness.com

Image by macrovector on Freepik

Introduction

This lesson will cover two different topics being used in the same malware script.

The first is called Polymorphism. In the context of malware, polymorphism refers to a technique used by malicious software to change its appearance or code structure while maintaining its original functionality. This method allows the malware to evade detection by traditional signature-based antivirus and security systems, which rely on identifying known patterns or signatures of malware.

The second is …

called change code context cybersecurity forensics image injection it security malicious malicious software malware polymorphic polymorphism process process injection script software topics tutorial

Senior Security Researcher

@ Microsoft | Redmond, Washington, United States

Sr. Cyber Risk Analyst

@ American Heart Association | Dallas, TX, United States

Cybersecurity Engineer 2/3

@ Scaled Composites, LLC | Mojave, CA, US

Information Security Operations Manager

@ DP World | Charlotte, NC, United States

Sr Cyber Security Engineer I

@ Staples | Framingham, MA, United States

Security Engineer - Heartland (Remote)

@ GuidePoint Security LLC | Remote in the US