in Technology by

________ is a technique where attackers modify legitimate software to hide a malicious application. Wipers Exploits Code caves Weaponized documents

Please log in or register to answer this question.

1 Answer

0 votes
by

________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

Related questions

...