Malware developers are always looking for new technics to bypass security systems. In this article we will see how Windows Installer can be abused to deliver malicious code, and how the famous ransomware Maze uses this type of technic. Create malicious MSI files An MSI file is a compressed database [...]
[Webinar in french]
Attacks in recent years have shown us that attackers are and will always find new techniques and tactics that allow them to bypass security mechanisms.
Consequently, in addition to detection and response mechanisms, each organization must today incorporate into its defense strategy tactical tools enabling them to rapidly remedy attacks.
The objective of this type of tool is to quickly recover stolen or altered data and thus ensure their economic resilience.
During this webinar, our CTO Antoine Botte will present us in more detail the objectives of these types of mechanisms and how the EDR Nucleon Smart Endpoint can automate these post-exploitation actions.
To prepare your questions about these mechanisms offered by Nucleon Smart Endpoint, you can read our blog article Overview Of Rollback & Remediation Features Againts HAKBIT Ransomware Attack.