Persistence is just another opportunity for detection.
Persistence techniques give adversaries the ability to maintain access to compromised systems, but they also present opportunities for detection. Watch this on-demand webinar that explores persistence with Carbon Black and MITRE ATT&CK.
This ATT&CK Deep Dive walks through:
- Common techniques that adversaries and malware use to persist in macOS, Linux, and Windows environments
- Practical guidance on observing prevalent persistence mechanisms and detecting corresponding threats
- In-depth analysis of routine and sophisticated persistence techniques
- Examples of prominent, persistent malware