Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 81 to 90
LLDBFuzzer: Debugging And Fuzzing The Apple Kernel With LLDB Script
8th Aug 2019 [2 months ago] from TrendMicro
Our fuzzing methodology LLDBFuzzer found dozens of vulnerabilities, including double free and out-of-bounds (OOB) read/write bugs. These vulnerabilities could allow an attacker access to restricted memory or be used in a privilege escalation...
Saefko: A New Multi-layered RAT
8th Aug 2019 [2 months ago] from Zscaler
Recently, the Zscaler ThreatLabZ team came across a new remote-access trojan (RAT) for sale on the dark web. The RAT, called Saefko, is written in .NET and has multiple functionalities. This blog provides a detailed analysis of this piece...
Finding Evil In Windows 10 Compressed Memory, Part Two: Virtual Store Deep Dive
8th Aug 2019 [2 months ago] from FireEye Research
IntroductionThis blog post is the second in a three-part series covering ourWindows 10 memory forensics research and it coincides with our BlackHatUSA 2019 presentation. In PartOne of the series, we covered the integration of the research...
Finding Evil In Windows 10 Compressed Memory, Part Three: Automating Undocumented Structure Extraction
8th Aug 2019 [2 months ago] from FireEye Research
This is the final post in the three-part series: Finding Evil inWindows 10 Compressed Memory. In the first post (Volatilityand Rekall Tools), the FLARE team introduced updates toboth memory forensic toolkits. These updates enabled these...
Commando VM 2.0: Customization, Containers, And Kali, Oh My!
8th Aug 2019 [2 months ago] from FireEye Research
The Complete Mandiant Offensive Virtual Machine (“Commando VM”)swept the penetration testing community by storm when it debuted inearly 2019 at Black Hat Asia Arsenal. Our 1.0release made headway featuring more than 140 tools. Well...
From Unstructured Data To Actionable Intelligence: Using Machine Learning For Threat Intelligence
8th Aug 2019 [2 months ago] from Microsoft
The security community has become proficient in using indicators of compromise (IoC) feeds for threat intelligence. Automated feeds have simplified the task of extracting and sharing IoCs. However, IoCs like IP addresses, domain names,...
Protect Against BlueKeep
8th Aug 2019 [2 months ago] from Microsoft
DART offers steps you can take to protect your network from BlueKeep, the “wormable” vulnerability that can create a large-scale outbreak due to its ability to replicate and propagate. The post Protect against BlueKeep appeared first...
Facebook Hits Two App Developers With Lawsuit
8th Aug 2019 [2 months ago] from ESET Research
The legal action, brought over alleged click injection fraud, is said to be among the first of its kind The post Facebook hits two app developers with lawsuit appeared first on WeLiveSecurity
Facebook Sues Two App Developers Over Alleged Ad Fraud
8th Aug 2019 [2 months ago] from ESET Research
The legal action, brought over alleged click injection fraud, is said to be among the first of its kind The post Facebook sues two app developers over alleged ad fraud appeared first on WeLiveSecurity
Varenyky: Spambot à La Française
8th Aug 2019 [2 months ago] from ESET Research
ESET researchers document malware-distributing spam campaigns targeting people in France The post Varenyky: Spambot à la Française appeared first on WeLiveSecurity
« Newer 4 5 6 7 8 9 10 11 12 13 Older »