In an effort to evade EDR protections, threat actors are shifting to data theft and extortion attacks instead of deploying ...