Persistence is one of the key things for threat actors to maintain their access to compromised systems and establish connections whenever they require. One of the key methods used to maintain persistence is the use of scheduled tasks. A threat actor who is identified as “HAFNIUM” has been discovered to be using an unconventional method
The post Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks appeared first on Cyber Security News. Read More
Posted inNews