In the second part of our Water Labbu blog series, we explore how the threat actor exploits Electron-based applications using Cobalt Strike to deploy backdoors.
This article has been indexed from Trend Micro Research, News and Perspectives
Read the original article: