Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
Sub-technique of
T1546
See: MITRE ATT&CK
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
Sub-technique of
T1546
See: MITRE ATT&CK
1 item with this tag.