COM Objects Hijacking ~ VirusTotal BlogThe COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escal...#com-objects#windows#windows-malware·blog.virustotal.com·Mar 8, 2024COM Objects Hijacking ~ VirusTotal Blog