in Technology by (1.9m points)
________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

1 Answer

0 votes
by (1.9m points)

________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

...