Watch this video on YouTube
Which type of attack embeds malicious payload inside a reputable or trusted software?