Researchers have described two new attack methods that can be used to “blind” cybersecurity products that rely on a logging mechanism named Event Tracing for Windows (ETW).
- Posted on
- By SecurityIT
- In Endpoint Security, NEWS & INDUSTRY, Vulnerabilities

