THREAT ANALYSIS: Taking Shortcuts… Using LNK Files for Initial Infection and Persistence

THREAT ANALYSIS: Taking Shortcuts… Using LNK Files for Initial Infection and Persistence

Cybereason issues Threat Analysis reports to explore widely used attack techniques, outline how threat actors leverage these techniques, describe how to reproduce an attack, and report how defenders can detect and prevent these attacks. 

Article Link: THREAT ANALYSIS: Taking Shortcuts… Using LNK Files for Initial Infection and Persistence