Post Profile

Doppelgänging: How to circumvent security products to execute code on Windows

Windows processes can be exploited to circumvent traditional security products, say researchers at Black Hat Europe.
read more


Related Posts

LastPass exploit allows remote code execution and password theft

Technology / Hardware : Extremetech

LastPass is in the process of patching a security hole that could allow an attacker to execute remote code on your machine and access your passwords. Really, the worst possible scenario you can imagine. The post LastPass exploit all...

How Millions of Apps Are Vulnerable to a Single Security Hack

Technology / Internet : Make Use Of

At this year’s Black Hat Europe security conference, two researchers from the Chinese Hong Kong University presented research that showed an exploit affecting Android apps that could potentially leave over one billion installed appl...

Facebook hands out Visa debit cards to white hat hackers

Technology : The Inquisitr - Tech

In an effort to squash bugs and stomp out security exploits, Facebook has begun handing out Visa debit cards to white hat hackers–or “security researchers”–for any bugs and/or exploits they’re able to find. Researchers can receive a...

Security Researchers Reveal Vulnerabilities in Chrome OS and OSX

Technology : ReadWriteWeb

Security researches revealed vulnerabilities in ChromeOS this week at Black Hat it was reported by VentureBeat today. By exploiting an issue in the pre-installed ScratchPad extension, the researchers were able to gain access to data...

AtomBombing: Zero-Day Windows exploit

Technology :

Ensilo security researchers have discovered a new zero-day exploit in Windows that attackers can make use of to inject and execute malicious code. The researches call the exploit AtomBombing because of its use of a Windows function ...


Copyright © 2016 Regator, LLC