{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"TechDaily.ai","title":"How Hackers Stay Hidden: Detecting Windows consistent Persistence with StoneFly SA365","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/c90929eb\"></iframe>","width":"100%","height":180,"duration":748,"description":"In this eye-opening episode of TechDaily.AI, we uncover the stealthy persistence tactics cyber attackers use to maintain access on Windows systems — even after reboots and logoffs. From scheduled tasks to startup scripts, registry hacks, and Windows service manipulation, we break down how legitimate Windows features are turned into backdoors for malware and espionage. Sponsored by StoneFly, your trusted enterprise data protection partner.🔐 You’ll Learn:What “persistence” means in cybersecurityHow attackers abuse scheduled tasks and registry run keysReal-world examples of PowerShell and CMD-based exploitsHow Windows services and Winlogon keys are hijackedTools and signs to detect and remove persistent threats🔍 Perfect for IT pros, cybersecurity enthusiasts, and anyone serious about system security. Don’t miss this deep dive!","thumbnail_url":"https://img.transistorcdn.com/MKzoODnpsE2Vy4aGphW9b-GBzDjrXS02jU9UfoOrOl4/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZjQ4/NzM0YWU5MjE5MmI4/NzM3Mjg2YzM0NGE5/ZjUzYi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}