Technology ❯ Cybersecurity ❯ Threat Detection ❯ Attack Techniques
It analyzes library‑load behavior, cross‑checking verdicts in KSN to reduce false positives.