Doppelgänging: How to circumvent security products to execute code on Windows

Full Article :

ZDNet - Security -

Windows processes can be exploited to circumvent traditional security products, say researchers at Black Hat Europe.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: