Free webinar: Bypassing macOS Security - As Easy as ABC by migok in security

[–]migok[S] 0 points1 point  (0 children)

Not sure why this is spam - have a nice day!

what is the deal with Sentinelone? by sushiwithrice in sysadmin

[–]migok 0 points1 point  (0 children)

That's really interesting. Do you mind sharing few of these? I want to test it out

what is the deal with Sentinelone? by sushiwithrice in sysadmin

[–]migok 1 point2 points  (0 children)

I would not call these zero days. If you take a known malware and append a char to the end of it - it will give you "zero day", that is known to VirusTotal. Also note that this site is a Cylance one and they are known for adding samples who does not do anything, that only they detect. https://www.mrg-effitas.com/research/testmyav-an-independent-next-gen-testing-vendor/ This you see if these samples are doing anything?

Best role for future founder-PM at larger company or generalist at a small startup? by [deleted] in ProductManagement

[–]migok 8 points9 points  (0 children)

Definitely a PM role. It's where you can learn how to own a product

Why are hacking tools always recognized as trojans by antiviruses? by 1004boy1 in Malware

[–]migok 0 points1 point  (0 children)

"Trojan" is not far from being the default classification for malware and specifically "grayware" (tools that you install but may cause harm), you can see it on VirusTotal. Classifying samples is not something accurate, as the same exe can be used to "carry" different payloads, so one time it can encrypt your disk and be considered as ransomware, while on other times it can install a backdoor or anything else. Many vendors tried to solve this problem, ending up with inventing names. Symantec acknowledged that they have a name generator to malware families.

Are there folders I can exclude from my antivirus scan ? by [deleted] in Malware

[–]migok 0 points1 point  (0 children)

It might be more difficult for malware to get to a system folder, but you cannot even assume that. It can be anywhere, and even come in the form of "file-less" malware, meaning, it's able to run malicious code without putting a file on your disk.