EDGE 2020 Goes Virtual
Many traditional antivirus (AV) programs operate on signatures—as malicious software is discovered, a signature describing the file is generated, added to a database, then the database gets pushed out to the customer base.
Signature-based AV solutions can have a hard time keeping up with this volume, often leaving devices vulnerable. Over time, we have seen the rise of new defenses; however, each defense triggers a corresponding change in tactics from the bad guys. These changes include malware designed not just to exploit vulnerabilities, but to outwit an AV’s defenses. Here are 5 types of attacks that slip past traditional antivirus.