As technical cyber security controls become increasingly sophisticated, threat actors are constantly on the lookout for novel ways to evade and overcome them. A frequent source of success among cyber ...