This resource is no longer available
In order to bypass threat detection methods, threat actors are leveraging new and uncommon programming languages, a trend being found in a growing number of malware families.
This report dives deeper into this trend by focusing on 4 of the most popular of these exotic languages and their use in the malware space.
Access the report to see how and why attackers are making this switch, as well as how defenders can use this knowledge to their advantage.