I was reading about a new vulnerability in AV programs, AVGator. In short, the attack works like this: A malicious file is delivered to the host, the AV catches the malicious file and quarantines the file, the attacker manipulates NTFS to restore the…