|
You are here |
securityinaction.wordpress.com | ||
| | | | |
thehackernews.com
|
|
| | | | | EDRKillShifter, a new tool linked to RansomHub ransomware, targets EDR software, posing a growing threat to endpoint security. | |
| | | | |
blog.eclecticiq.com
|
|
| | | | | The latest Analyst Prompt looks at FIN7 delivering Clop ransomware, a BatLoader campaign that leverages ChatGPT and Midjourney imposter apps, and more. | |
| | | | |
redteaming.co.uk
|
|
| | | | | DLL Side-Loading or DLL Proxy loading allows an attacker to abuse a legitimate and typically signed executable for code-execution on a compromised system. Mitre has been keeping a log of this technique since 2017, and it continues to be a popular option by threat actors (For good reasons!) Proxy loading is very similar to DLL... | |
| | | | |
blog.trailofbits.com
|
|
| | | Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real world attacker mentality to reduce risk and fortify code. | ||