Emulation of Kernel Mode Rootkits With Speakeasy
January 20 2021In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreThe techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.
Read more
Google’s Project Zero has exposed a sophisticated watering-hole attack targeting both Windows and Android:
Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were...
Read more
Seven flaws in DNSMasq have limited impact, but in combination they could be chained to create a multistaged attack.
Read moreEnforcement mode for the Netlogon Domain Controller will be enabled by default with the Feb. 9 security update.
Read moreMeanwhile, Malwarebytes is the latest victim, Symantec discovers a fourth piece of malware used in the massive attack campaign, and FireEye Mandiant releases a free tool to help spot...
Read moreHere's to the sneakiest of the sneaky. These clever phishing messages -- that standard validation measures often missed -- deserve proper dishonor.
Read more
Recent Comments