<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">


Authors of malicious code employ clever tactics to get around security tools such as analysis sandboxes and antivirus products. Get access to Lenny Zeltser's slides and detailed notes from his Security Weekly podcast segment where you will: 

  • Understand the tactics malware authors use to evade detection and analysis
  • Learn how to examine different aspects of malicious code with a disassembler and debugger
  • How to reverse-engineer malware on your own to better understand its capabilities



NoteBy submitting your details, you accept to receive marketing communications and research updates from Minerva Labs. You can always unsubscribe.