Address on whitelist and blacklist. Which wins?
Whitelist
Whitelisted/blacklisted apps can be identified by…
hash value, certificate
Whitelisting flaw
Apps that run in memory
AV File trajectory
Hosts where files were seen
AV Device trajectory
Actions that files performed on a given host
Packed malware
Compressed to make it polymorphic