Certutil attack vector

Could you do a video on this: https://www.bleepingcomputer.com/news/security/certutilexe-could-allow-attackers-to-download-malware-while-bypassing-av/

Thought it was an interesting technique, which i’ve not seen covered any where else.

1 Like