Several common process tampering attacks exploit the gap between process creation and when security products are notified. Elastic Security detects a variety of such techniques, including Doppelgänging, Herpaderping, and a new technique: Ghosting

Note: This is a summary from the RSS feed. For the complete article with full details, please visit the original post on the Elastic Blog.