SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThere have been many papers discussing the major aspects of the QAZ companion virus, and a compilation of several of these papers indicates that there may yet be surprises. We are dealing with a selective, stealthy infectious agent in that the spreading process is limited. When introduced into on a single LAN without effective AV protection, QAZ can remain for a long time undetected. With QAZ, anything can be uploaded and run. An infected PC can, using uploaded tools, attack anything. When caught in a trace or in a log, the owner is the owner of the infected PC and not the attacker. Usually the attack tools will be found on the QAZ infected PC only during use. They will not be there when someone knocks on the door