It’s no surprise that 94% of malware is delivered via Microsoft Office files: for $3 or less, threat actors can easily purchase pre-made weaponized documents with a money-back guarantee that the zero-day malware inside will successfully execute. On top of this, traditional malware security defenses cannot detect and protect against unknown or signatureless threats. As companies deploy digital transformation initiatives, accept files from untrusted parties via apps and portals, and expand WFH policies, file-sharing grows and the corporate attack surface widens.
Join ex-IDF security researcher and past pentester Aviv Grafi to deep-dive into stealthy ways that malware enter networks via weaponized files and links and evade both employees and detection solutions like email gateways, AV, and sandboxing.
- Learn common techniques that hackers use to evade detection-based security tools
- View real, recent examples of evasion techniques from the billions of malicious files that Votiro processes each year
- Dissect a malicious file, showing how hackers hide malware inside common and business-important elements like macros