Malware comes in different shapes and sizes. They are even produced in a massive scale. But attackers know that this is not enough. Malware has to be protected. In this talk, I will present the different techniques attackers use to protect and mask malware to bypass security products and analysis. I will show how attackers have perfected this methodology giving them the capability to automate malware masking to match the massive malware production done on a regular basis. But there is hope, in this talk, I will also present different techniques on how to “unmask” malware to reveal its true nature.