Summary
Now that we have finished this chapter, you should have a better understanding of what the Veil-Framework is and how it functions. It is important to remember the need for antivirus software and to always keep it updated with the latest file signature databases. As we discussed, using outdated antivirus databases will render antivirus protection useless. After explaining what a zero day exploit is and why it is so effective, you can understand why zero days are nearly impossible to stop. Remember that a clear majority of zero day exploits will not be stopped by antivirus software, intrusion detection systems, or traditional cyber security methods. We will discuss later in this book how to use the threat hunter doctrine to mitigate ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access