Hello,
I believe, for performing behaviour based detection , there may not be any signatures , and most of the detection is based on
husristics/scan performed on the code/attachment etc.
Can anybody please provide samples/examples of behaviour based malware.
Deployement of Sophos engine would be in a security gateway .
This thread was automatically locked due to age.