How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks

A sophisticated new malware/trojan attack is designed to steal login credentials and credit card information from payment systems, banks and crypto exchanges. This attack tricks legitimate business applications into running compromised but innocent-looking dynamic link library (DLL) files — making it very difficult to detect and block.

DLL sideloading is a technique used by cybercriminals to execute malicious code on a target system by exploiting the way Windows loads dynamic link libraries (DLLs). This blog explores how Check Point’s advanced Threat Emulation engines, part of Infinity ThreatCloud AI, detected and prevented a DLL Sideloading attack on one of our customers.

Click here to view original web page at www.checkpoint.com

Most Recent Posts

  • All Post
  • Cisco
  • CkeckPoint
  • Commvault
  • Fortinet
  • Happiness
  • Huawei
  • Lenovo
  • NetApp
  • PECB Training
  • Press Release
  • VMware
    •   Back
    • Information Security
    • Cybersecurity
    • Continuity Resilience and Recovery
    • Governance Risk and Compliance
    • Privacy and Data Protection

Press Release

  • All Post
  • Cisco
  • CkeckPoint
  • Commvault
  • Fortinet
  • Happiness
  • Huawei
  • Lenovo
  • NetApp
  • PECB Training
  • Press Release
  • VMware
    •   Back
    • Information Security
    • Cybersecurity
    • Continuity Resilience and Recovery
    • Governance Risk and Compliance
    • Privacy and Data Protection

Categories