September 5, 2023
Three persistence techniques were exposed in the advisory: a registry run key to restart the malware when the computer reboots, a particular directory where the malware is stored on disk, and a specific registry key containing runtime configuration for the malware. By emulating these three techniques, you can determine how your endpoint defense will respond. Ideally, an EDR will notice the high-profile events and prevent the associated process from continuing.
Be immediately notified of new advisories and associated security tests