Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: SANS GIAC GSEC Audio Course

Episode 66 — Malware I: Types, Vectors, and Evasion

22 Oct 2025

Description

Malware is a constant in cybersecurity, and this episode breaks down its many forms, how it spreads, and how it hides. You’ll learn the defining characteristics of viruses, worms, trojans, rootkits, and fileless malware, along with how each exploits different weaknesses in operating systems and users. We explore infection vectors ranging from malicious attachments to drive-by downloads and compromised supply chains, illustrating how attackers chain small errors into major breaches. The conversation also introduces evasion tactics—obfuscation, polymorphism, and living-off-the-land techniques—that make modern threats harder to detect.Listeners will gain context on how defenders identify, classify, and respond to emerging threats. The episode explains how sandboxing, heuristics, and behavioral analysis complement traditional signature detection to uncover new variants. We also discuss how adversaries exploit trust in digital signatures or legitimate administration tools to blend into normal activity. By the end, you’ll understand how the GSEC exam expects you to reason through the lifecycle of a malicious program—from introduction to execution to containment—and why vigilance begins with knowing what “normal” looks like. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.