In this article, we examine the use of application programming interfaces (PAM) in malicious software, as well as how they can be used to gain access to victim systems through the authentication process.

Click here for more details.