Execution Prevention
BlackFog 4.2 and above offers a new feature called "execution prevention" within the settings. This option provides a new technique for preventing malware execution.
Process Monitoring
Typically, organizations and previous editions of BlackFog utilized a whitelisting approach, whereby execution of rogue malware was prevented by blocking execution in specific directories such as temporary folders or application data directories. Whilst very effective at preventing malware, the downside was that many legitimate applications often used these locations as well. Even though this is against guidelines, companies such as Google and Microsoft's own applications sometimes used this method, meaning that when you installed a new application that used these directories you had to whitelist the files. Users found this to be invasive so we decided to develop a new approach.
We have eliminated whitelisting in favor of process monitoring and application validation. This is a behavioral technique for detecting malicious activity. The principle behind this technique is that malware often masquerades as other applications, spawns from system processes and executes in certain ways. In these scenarios we introspect all of the processes to see if they are being hijacked, replicated or simply spoofed. As with the data exfiltration rules, this is done in real-time.
Reducing False Positives
Ultimately this will lead to less false positives and ensure more accurate protection than whitelisting can ever provide. In addition, this will protect execution across the entire device rather than specific directories.
Share This Story, Choose Your Platform!
Related Posts
The Role of Wireless Intrusion Detection: Guard Against Invisible Threats
Learn everything you need to know about wireless intrusion detection and why it should have a place in your cybersecurity strategy.
IPS Tools in Cybersecurity: Still Essential in 2025?
Learn why businesses need IPS tools and how these offerings work to boost cybersecurity defenses.
IDS vs IPS: What’s the Difference and Why Do You Need Both?
Understanding the differences in IDS vs IPS technology and what each is capable of is essential in building a comprehensive cybersecurity defense strategy.
What Makes Deep Learning in Cybersecurity Different and Why it Matters for Cybersecurity
Explore how deep learning in cybersecurity offers advanced threat detection, behavioral analytics and real-time responses.
5 Key Challenges When Adopting AI and Machine Learning in Cybersecurity
While AI and machine learning in cybersecurity offer powerful benefits, businesses face major challenges when adopting these technologies. Learn what to expect and how to prepare.
Machine Learning in Cybersecurity: Tactics and Trends
Find out how machine learning in cybersecurity is transforming how businesses can defend against increasingly sophisticated hacking attacks in our comprehensive guide to these trends.