04.07.2022 Views

Cyber Defense eMagazine July Edition for 2022

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

that the Netwalker ransomware attack is conducted through reflective dynamic-link library (DLL) injection.<br />

She also notes that this technique allows a DLL to be injected in a way that bypasses the windows loader.<br />

That way, she adds, the DLL isn’t loaded as part of a process and can evade DLL monitoring tools.<br />

A DLL is a program module containing code used by multiple programs that run on the Windows operating<br />

system.<br />

Protection <strong>for</strong> Small Businesses<br />

Ultimately, small businesses need access to advanced endpoint protection tools that can stop fileless<br />

ransomware and file-based ransomware. Such tools should be supplied as part of af<strong>for</strong>dable solutions.<br />

After all, small businesses have extremely limited budgets but, as a whole, employ a lot of people.<br />

Software proprietors and off-the-shelf software companies should work closely with these businesses to<br />

ensure that advanced endpoint software such as EDR software can be deployed quickly.<br />

About the Author<br />

Prem Khatri is the Vice President of Operations <strong>for</strong> Chetu, Inc., a<br />

global, custom software development company, where he<br />

oversees all development projects and technical operations. His<br />

primary responsibilities are to lead, track and manage technical<br />

teams that create custom software solutions. His background<br />

includes software development using C++, Java, and Microsoft<br />

technologies. Since joining Chetu in 2008, he has helped the<br />

company become an award-winning global presence in the<br />

customized software development field. Prior to joining Chetu,<br />

Prem worked <strong>for</strong> Tata Consultancy Services, as well as Blue Star<br />

Infotech, and is a graduate of both the University of Mumbai and<br />

Savitribai Phule Pune University. Prem is a certified Project<br />

Management Professional (PMP). He can be reached online at our company website, www.chetu.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2022</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!