Security The Next Generation Catch-22

%3CLINGO-SUB%20id%3D%22lingo-sub-514820%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20The%20Next%20Generation%20Catch-22%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-514820%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F276631%22%20target%3D%22_blank%22%3E%40Netteligent%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F124214%22%20target%3D%22_blank%22%3E%40Yuri%20Diogenes%3C%2FA%3E%3A%20Is%20this%20something%20you%20can%20speak%20to%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-565052%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20The%20Next%20Generation%20Catch-22%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-565052%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293935%22%20target%3D%22_blank%22%3E%40Valon_Kolica%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F276631%22%20target%3D%22_blank%22%3E%40Netteligent%3C%2FA%3E%20-%20Fileless%20attack%20detection%20is%20natively%20available%20in%20Windows%20Defender%20ATP%2C%20more%20info%20here%26nbsp%3B%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fintelligence%2Ffileless-threats%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fintelligence%2Ffileless-threats%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-508639%22%20slang%3D%22en-US%22%3ESecurity%20The%20Next%20Generation%20Catch-22%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-508639%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EChallengers%20have%20figured%20out%20how%20to%20bypass%20traditional%20antivirus%20software%20with%20file-less%20attacks%20designed%20to%20hide%20within%20sanctioned%20applications%20and%20even%20within%20the%20OS%20itself.%20So%2C%20even%20if%20you%E2%80%99re%20vigilant%20about%20installing%20patches%20and%20pushing%20out%20antivirus%20updates%2C%20we%20are%20likely%20still%20at%20risk.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EI%20listening%20to%20many%20certified%20security%20pro%20and%20many%20developers%20but%20not%20satisfy%20with%20my%20curious%20mind.%20%3C%2FSPAN%3E%3C%2FP%3E%3CUL%3E%3CLI%3EHow%20attackers%20have%20adapted%20their%20tactics%20to%20evade%20traditional%20antivirus%3C%2FLI%3E%3CLI%3EHow%20these%20increasingly%20common%20attacks%20work%20and%20what%20makes%20them%20difficult%20to%20detect%3C%2FLI%3E%3CLI%3EHow%20attackers%20have%20adapted%20their%20tactics%20to%20evade%20traditional%20antivirus%3C%2FLI%3E%3CLI%3EWhy%20a%20new%20approach%20to%20endpoint%20threat%20detection%20is%20needed%20to%20catch%20these%20advanced%20attacks%20and%20how%20we%20can%20proactively%20and%20quickly%20evolve%20your%20threat%20detection%20strategy%3F%3C%2FLI%3E%3CLI%3EWhy%20can%E2%80%99t%20we%20identify%2C%20tag%2C%20monitors%20and%20track%20these%20attackers%3F%20Then%20bring%20them%20to%20justice.%3C%2FLI%3E%3CLI%3EFurthermore%2C%20insider%20threats%20are%20more%20harmful%20than%20outside%20attackers.%20They%20can%20either%20steal%20valuable%20data%20or%20plant%20a%20bugs%3F%3C%2FLI%3E%3CLI%3EMost%20important%20of%20all%2C%20I%20am%20interested%20to%20learn%20more%20about%20Microsoft%20Security%20to%20protect%20Windows%2010%20clients%2C%20servers%20and%20Azure.%3C%2FLI%3E%3CLI%3EOne%20more%20thing%2C%20penetration%20testing%20for%20network%20and%20codes.%20Current%20tools%20and%20techniques%20for%20professional%20ethical%20hackers%20and%20developers%20to%20test%20their%20platforms%3F%3C%2FLI%3E%3C%2FUL%3E%3CP%3EI%20am%20immensely%20interested%20to%20learn%20more%20about%20Microsoft%20Security%20to%20protect%20Windows%2010%20clients%2C%20servers%20and%20Azure.%20Thanks%20from%20bottom%20of%20my%20heart.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Occasional Contributor

Challengers have figured out how to bypass traditional antivirus software with file-less attacks designed to hide within sanctioned applications and even within the OS itself. So, even if you’re vigilant about installing patches and pushing out antivirus updates, we are likely still at risk.

I listening to many certified security pro and many developers but not satisfy with my curious mind.

  • How attackers have adapted their tactics to evade traditional antivirus
  • How these increasingly common attacks work and what makes them difficult to detect
  • How attackers have adapted their tactics to evade traditional antivirus
  • ​Why a new approach to endpoint threat detection is needed to catch these advanced attacks and how we can proactively and quickly evolve your threat detection strategy?
  • Why can’t we identify, tag, monitors and track these attackers? Then bring them to justice.
  • Furthermore, insider threats are more harmful than outside attackers. They can either steal valuable data or plant a bugs?
  • Most important of all, I am interested to learn more about Microsoft Security to protect Windows 10 clients, servers and Azure.
  • One more thing, penetration testing for network and codes. Current tools and techniques for professional ethical hackers and developers to test their platforms?

I am immensely interested to learn more about Microsoft Security to protect Windows 10 clients, servers and Azure. Thanks from bottom of my heart. 

2 Replies
Highlighted

@Netteligent 

 

@Yuri Diogenes: Is this something you can speak to? 

Highlighted

@Valon_Kolica @Netteligent - Fileless attack detection is natively available in Windows Defender ATP, more info here https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/fileless-threats