We all depend on the various technical cyber security solutions we deploy, firewalls, anti-virus, end point detection and response (EDR), there are many names and the threat actors know we depend on them. So it should come as no surprise that there are attacks, that first attempt to disable these …