Webinar recorded on March 15, 2018 | Webinar length: 1hr


 

Summary


In this new webinar series, you will learn the tactics used to exploit weaknesses in traditional security solutions. We will examine the methods and tools adversaries use to gain access to vital systems and data.

Come prepared for the unexpected, as Stuart often has at least one cool trick up his sleeve.

Watch the webinar to learn about:
  • DLL-based attacks
  • Direct execution
  • Side-loading techniques
  • High-profile breaches using DLLs
We hope you will join us for future Cylance events. In the meantime, consider enjoying some of the free content hosted on the Cylance website.

Downloads