Attackers Use Event Logs to Hide Fileless Malware

Attackers Use Event Logs to Hide Fileless Malware

A sophisticated campaign utilizes a novel anti-detection method.