Technology ❯ Information Security ❯ Threat Intelligence ❯ Attack Vectors
It analyzes library‑load behavior, cross‑checking verdicts in KSN to reduce false positives.