(Source: SC Magazine UK) … increasingly adopted by cyber-crime authors to evade security software. … as possible to minimise the potential for detection by enterprise security controls.”.