Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> run EDR

> does not detect initial compromise

> does not detect persistent so

> does not detect preloads

> does not detect injection

> does not detect exfiltration

What does the D stand for again? Besides the entire threat vector and article being an unsurprising non-story. Yes, if you can modify the execution environment you can modify the executed code.





What you take if you use a bad one?



Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: