Cyber attackers are increasingly using DLL (Dynamic Link Library) files to spread malware. Modern attack chains have complex multi-stage flows and DLL is a common step in all major malware families. Methods like DLL hijacking, sideloading, and reflective DLL injection allow the malware to hide as part of trusted software. Attackers, often use DLLs that look innocent but trigger an attack chain. To combat these evasive threats, Check Point developed a new AI engine for DLL files – detecting malicious patterns in content and context. What are DLLs? DLLs are a type of file in Windows Operating Systems that contain […]
The post DeepDLL– A New Approach to Detect Malicious DLLs appeared first on Check Point Blog.
This article has been indexed from Check Point Blog