By: - Forensics and Security Expert


Are You Ready for Steganography Malware?

July 17th, 2013

Traditionally, the bad guys’ malware bypasses our signature based defenses with some form of obfuscation, like encoding their malware with XOR, base64, gzip etc. or using any of the malware packers tracked by Shadowserver. Penetration testers have long relied upon the capability in Metasploit to render their payloads undetectable to Antivirus programs. Peter Gramantik, a […]

IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us