Security researchers claim 400GB of corporate data stolen from Hacking Team in a recent cyberattack contains a number of unreported, unpatched Adobe flaws. A number of exploits and their coding is ...
The Exploit Laboratory series has two advanced offerings to consider. Exploit Laboratory: Black Belt will cover advanced browser exploitation techniques, including DEP and ASLR bypass, ROP chaining ...
The exploit that attackers are using to target a zero day vulnerability in Microsoft Word relies on a complex series of pieces, including an ASLR bypass, ROP techniques and shellcode with several ...
Recent in-the-wild attacks on the critical Bluekeep vulnerability in many versions of Windows aren’t just affecting unpatched machines. It turns out the exploits—which repurpose the September release ...
Angler’s unique obfuscation, ability to detect antivirus and virtual machines, encrypted payload and fileless infection have some calling it the most sophisticated exploit kit. The Angler exploit kit ...
The decision by Internet Security Systems Inc. (ISS) research analyst Michael Lynn to speak at this week’s Black Hat USA conference about how unpatched Cisco routers can be remotely compromised has ...
Exploits of Microsoft’s server message block (SMB) protocol have been an “unmitigated success” for malware writers, according to researchers at security firm Cylance. In April 2017, the Shadow Brokers ...
The iPhone is now officially fresh meat: Metasploit creator HD Moore has added iPhone-hacking features to the wildly popular freebie penetration testing tool. (See Now Playing: Metasploit 3.0.) ...