Exploits of Microsoft’s server message block (SMB) protocol have been an “unmitigated success” for malware writers, according to researchers at security firm Cylance. In April 2017, the Shadow Brokers ...
The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Researchers have discovered that the Darkhotel APT is ...
New Microsoft Silverlight and Adobe Flash exploits included in the Angler Exploit Kit have the ability to bypass Microsoft EMET on Windows machines. New Microsoft Silverlight and Adobe Flash exploits ...
A new book by leading security researchers on writing code to exploit security flaws in software, including Microsoft Corp.’s Windows operating system, has raised some eyebrows in the technical ...
Two-day hands-on course offers a rare opportunity for beginners to build real browser exploits from scratch using V8 vulnerabilities. The two-day course, scheduled for August 4–5, is part of Black Hat ...
Security researchers claim 400GB of corporate data stolen from Hacking Team in a recent cyberattack contains a number of unreported, unpatched Adobe flaws. A number of exploits and their coding is ...
The Exploit Laboratory series has two advanced offerings to consider. Exploit Laboratory: Black Belt will cover advanced browser exploitation techniques, including DEP and ASLR bypass, ROP chaining ...
In recent times, one of the major improvements in the field of hacking has been the development of a range of tools for uncovering vulnerabilities. A vulnerability scanner can detect loopholes, but ...
The iPhone is now officially fresh meat: Metasploit creator HD Moore has added iPhone-hacking features to the wildly popular freebie penetration testing tool. (See Now Playing: Metasploit 3.0.) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results