Explore >> Select a destination


You are here

thinkdfir.com
| | lab52.io
17.8 parsecs away

Travel
| |
| | pentestlab.blog
11.0 parsecs away

Travel
| | In Windows environmentswhen an applicationor a serviceis startingit looks for a number of DLL's in orderto function properly.If these DLL'sdoesn't exist or are implemented in an insecure way (DLL'sare called withoutusing a fully qualified path) then itis possible to escalate privileges by forcing the application to load and execute amalicious DLL file. It should be...
| | lab52.io
10.8 parsecs away

Travel
| | The Lab52 team has analysed a cyber campaign in which attackers deploy a new variant of the PlugX malware. Both the infection chain and the various artefacts used in the cyberattack share multiple similarities with the SmugX campaign, attributed to threat actors Red Delta and Mustang Panda, allegedly linked to the Chinese government.
| | hackademix.net
85.4 parsecs away

Travel
|