This is a dedicated watch page for a single video.
Upon noticing an unusually high volume of nighttime traffic originating from local computers, Allen a security analyst, decides to investigate the cause. After conducting several checks, he discovers that an attacker, has successfully exfiltrated user data. Notably, conventional antivirus tools failed to detect any malicious software, and the IDS/IPS system did not raise alarms about non-whitelisted programs. Given this scenario, which type of malware did the attacker employ to circumvent the company's application whitelisting?