Content
- Weight places in protection
- how it works as it works as it works as it works Attack?
- How to protect yourself?
- What next?Modern cyber attacks are becoming more and more sophisticated, and the recent emergence of the malicious Edrkillshifter has become a clear confirmation. Hackers are increasingly aiming at antivirus programs using vulnerabilities in drivers to turn off the protection of devices. This new type of attacks, known as BYOVD (Bring Yor Own Vulnerable Driver), allows attackers to bypass even the most modern security systems.
more about cyberisms, you can find out on XRUST, which collected the latest news from the world of technology and security.
Содержание- how does the attack work?
- >How to protect yourself?
- What is next? And what do you think, how effective are modern antiviruses in counteracting such attacks? Share your opinion in the comments. Thank you for your attention! Subscribe to our updates to keep abreast of all news from the world of cybersecurity. If you like the article, we recommend reading Yandex Music: how to download and enjoy the best tracks without restrictions digital piano: Modern technologies for classical sound
- If you like the article, we recommend reading
how does the attack work?
edrkillshifter, in several stages:
- launch of an encrypted file.
- Deciphering and performing useful loads.
- Using a vulnerable driver to turn off protective programs.
every day of cybercriminals find new ways to circumvent protection, and this case shows how vulnerable the most advanced antiviruses can be.
>How to protect yourself?
To protect your devices, follow these recommendations:
- regularly update all the programs, including drivers.
- Use several levels of protection, for example, firewalls and antiviral programs from different developers. Attentive to suspicious files and links.
What is next?
And what do you think, how effective are modern antiviruses in counteracting such attacks? Share your opinion in the comments. Thank you for your attention! Subscribe to our updates to keep abreast of all news from the world of cybersecurity.
If you like the article, we recommend reading
- Yandex Music: how to download and enjoy the best tracks without restrictions
- digital piano: Modern technologies for classical sound
- Если Вам понравилась статья, рекомендуем почитать
- Terminator is returning: a new animated series from Netflix
- Life hacks to increase productivity