Code signing certificates help us assure the file’s validity and legitimacy. However, threat actors can use that against us. In this blog, discover how QAKBOT use such tactic and learn ways how to prevent it.
This article has been indexed from Trend Micro Research, News and Perspectives
Read the original article: