This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don't and why. The talk has a particular focus on AV evasion as it relates to Metasploit payloads.
Author: David Maloney is a Senior Software Engineer on the Metasploit team at Rapid7.
Posted on 24 July 2014. | The firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. If you take a moment to scan the infographic, you’ll notice the firewall's introduction and evolution coincide with certain security events.
Posted on 23 July 2014. | Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.
Posted on 22 July 2014. | A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.