Six Malicious Linux Shell Scripts Used to Evade Defenses and How to Stop Them | Threatpost
Siddartha Sharma and Adhokshaj Mishra Evasive techniques used by attackers, date back to the earlier days, when base64 and other common encoding schemes were used. Read More