Hi all, just thought I'd share this research from the Deep Instinct Research Team published at black hat, titled: Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable.
URL: https://www.blackhat.com/docs/us-16/mat ... ble-wp.pdf
URL: https://www.blackhat.com/docs/us-16/mat ... ble-wp.pdf