Shining a Light on a New Technique for Stealth Persistence

Threat Post, October 12th, 2018 - Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence.

Red teamers like myself and my team are driven by a desire to out-innovate the bad guys – to help the good guys. We study their methods, strive to think like they do, work to better understand attacker techniques and test our mettle against the spectrum of technologies in use today to find new ways to get around security measures.

To read more, click here:

Related Posts