10 months ago0 viewscybersecurityhackinginformation-securityA presentation about evading detection by modern antivirus and endpoint detection and response systems, discussing entropy and tools used to bypass security measures.