Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore advanced evasion techniques used by modern threat actors in this 57-minute conference talk from HackMiami XII. Delve into the sophisticated methods cybercriminals employ to bypass the 20-30 security tools typically deployed in mid-sized organizations, examining how attackers have evolved their tactics over the past two decades to maintain stealth throughout their entire attack chain. Learn about cutting-edge obfuscation techniques including code obfuscation, HTML smuggling, resource concealment, and anti-bot protections such as sandbox evasion, while discovering how threat actors exploit legitimate cloud services and leverage service-based offerings within the cybercrime underground. Gain insights through accessible code reviews of real malware and phishing campaigns, designed for participants without programming expertise, and understand how attackers reverse-engineer security solutions to make subtle yet impactful modifications that render their malware, phishing schemes, and automated tools completely undetectable by existing defense mechanisms.