Researchers have described two new attack methods that can be used to “blind” cybersecurity products that rely on a logging mechanism named Event Tracing for Windows (ETW).
from SecurityWeek RSS Feed https://ift.tt/30wJj8m
via https://ifttt.com/ IFTTT
No comments:
Post a Comment