Blog
Threat Evasion Techniques: Restricting By Device
Tue, 07/27/2021
Cybercriminals use evasion techniques to bypass scanning technologies and defeat human analysis in order to extend the life of phishing campaigns. There are a variety of evasion techniques and criminals often use multiple variations in tandem. In this post, we focus on active evasion, restricting non-targets by device.
Restricting by Device
Active evasion is any method an attacker uses to...