MemDive AI Engine Prevents Malicious Payloads from Evading Security Measures

 By Asaf Avisar, Arie Olshtein and Shiri Yaakobson   Highlights:   In recent months, MemDive allowed our Threat Emulation engine to prevent various attempts of a shellcode-based packer, aiming to execute STOP ransomware and the RedLine Stealer.  Check Point customers using Quantum and Harmony products (with the engine activated) are now protected against this pernicious attack vector.  Check Point’s Threat Emulation engine allows users to send files to ThreatCloud AI for inspection. The Threat Emulation engine uses internet-connected sandboxes to prevent multi-stage attacks by analyzing the full infection chain. We’ve recently implemented an advanced approach to detect and preventing encrypted malicious payloads, […]

The post MemDive AI Engine Prevents Malicious Payloads from Evading Security Measures appeared first on Check Point Blog.

This article has been indexed from Check Point Blog

Read the original article: