Relatively new technique can bypass many endpoint protections.