Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that could be used by...
An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what’s suspected to be an...
In a striking revelation shaking the cybersecurity world, researchers have unearthed a sophisticated web shell, dubbed ‘HrServ,’ hidden within a seemingly innocuous...
The open-source remote access trojan known as Quasar RAT has been observed leveraging DLL side-loading to fly under the radar and stealthily...
Threat actors used a well-liked piece of corporate communication software from 3CX, according to security experts. In particular, reports state that a...
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used by the notorious North...
Cisco issued a warning of active exploitation attempts targeting two security vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows. The...
A researcher has detected a critical vulnerability in some of the most common malware and ransomware variants today and whose exploitation would...
Dynamic-link library (DLL) side-loading is an increasingly popular cyberattack method that takes advantage of how Microsoft Windows applications handle DLL files. In...
Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. What is DLL hijacking ? Windows...
Injects C# EXE or DLL Assembly into any CLR runtime and AppDomain of another process. The injected assembly can then access static...
Imagine that you download a program or a software that you have been looking for and have been craving to work on...
Run PowerShell with dlls only. Does not require access to powershell.exe as it uses powershell automation dlls. dll mode: Usage: rundll32 PowerShdll,main...
Throughout this blog post we will be detailing a newly discovered RTF document family that is being leveraged by the FIN7 group...
A password stealing Trojan called AdService is being quietly distributed by adware bundles that typically install other programs such as Russian adware,...
Tutorials on Windows DLL injections in C have noticable gaps in what they explain. This blog post plus the comments on my...
Like many in the security industry, we’ve been busy investigating the implications of the Shadow Brokers leak, with the DOUBLEPULSAR payload in...
Researchers have crafted a stealthy new way of bypassing Windows User Account Controls (UAC) that opens the door to attacks on targeted systems....
While doing some research on the inner workings of Microsofts new Antimalware Scan Interface technology within Windows 10, i found a DLL...
No admin privileges are required to run the attack. Clever hackers can bypass Microsoft’s Windows AppLocker security feature by abusing a hidden trait...
Lottery boss wins $16.5 million in six years by tampering random number generator. According to The Des Moines Register, in a case from...