When it comes to new malware written in esoteric programming languages, Blue Team defenders have very little chance to ensure that all endpoints in their organization are able to detect and/or mitigate this malware. Security professionals have quickly recognized this issue and have built an effective pipeline to identify new releases of unique malware and develop detections for them.
]]>