thumbnail Malware trends: eBPF exploitation, malware configurations stored in unexpected places, and increased use of custom post-exploitation tools