Deception at Scale: How Malware Abuses Trust

The attackers actively use techniques to disguise malware files as legitimate, including reliable distribution channels, stolen certificates, hiding malicious files in legitimate applications, or using system tools to deploy malicious activity.... By: Gerardo Fernandez Full Abstract and Presentation Materials: #deception-at-scale-how-malware-abuses-trust-31254
Back to Top