Weaponized Disk Image Files: Analysis, Trends and Remediation
In this blog, I dissect a campaign that uses disk images to compromise a system, providing insight into what the Falcon Complete team has observed since 2019.