by Monique L. McGuire | Jun 20, 2020 | Technology News
A new attack technique has been discovered by Huntress Labs which uses a number of tricks including renaming legitimate files, impersonating an existing scheduled task and using fake error logs to hide in plain sight. After gaining persistence on a targeted system,...