Exploits of Microsoft’s server message block (SMB) protocol have been an “unmitigated success” for malware writers, according to researchers at security firm Cylance. In April 2017, the Shadow Brokers ...
Security researchers claim 400GB of corporate data stolen from Hacking Team in a recent cyberattack contains a number of unreported, unpatched Adobe flaws. A number of exploits and their coding is ...
The Exploit Laboratory series has two advanced offerings to consider. Exploit Laboratory: Black Belt will cover advanced browser exploitation techniques, including DEP and ASLR bypass, ROP chaining ...
New Microsoft Silverlight and Adobe Flash exploits included in the Angler Exploit Kit have the ability to bypass Microsoft EMET on Windows machines. New Microsoft Silverlight and Adobe Flash exploits ...
Recent in-the-wild attacks on the critical Bluekeep vulnerability in many versions of Windows aren’t just affecting unpatched machines. It turns out the exploits—which repurpose the September release ...
The iPhone is now officially fresh meat: Metasploit creator HD Moore has added iPhone-hacking features to the wildly popular freebie penetration testing tool. (See Now Playing: Metasploit 3.0.) ...
Angler’s unique obfuscation, ability to detect antivirus and virtual machines, encrypted payload and fileless infection have some calling it the most sophisticated exploit kit. The Angler exploit kit ...
Threat analysts have discovered a recent malware distribution campaign using PDF attachments to smuggle malicious Word documents that infect users with malware. The choice of PDFs is unusual, as most ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results