You are here |
bohops.com | ||
| | | |
m417z.com
|
|
| | | | A couple of weeks ago, Windhawk, the customization marketplace for Windows programs, was released. You can read the announcement for more details and for the motivation behind creating it. In this post, I'll focus on my journey in implementing the technical aspects of Windhawk. If you prefer reading code to reading text, check out the demo implementation. | |
| | | |
swordbytes.com
|
|
| | | | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application. | |
| | | |
malwaretech.com
|
|
| | | | Evading user mode EDR hooks by hijacking the AppVerifier layer | |
| | | |
cyble.com
|
|
| | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns. |