Security researchers claim 400GB of corporate data stolen from Hacking Team in a recent cyberattack contains a number of unreported, unpatched Adobe flaws. A number of exploits and their coding is ...
The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Researchers have discovered that the Darkhotel APT is ...
Dr. Chris Hillman, Global AI Lead at Teradata, joins eSpeaks to explore why open data ecosystems are becoming essential for enterprise AI success. In this episode, he breaks down how openness — in ...
A new book by leading security researchers on writing code to exploit security flaws in software, including Microsoft Corp.’s Windows operating system, has raised some eyebrows in the technical ...
Two exploits for Microsoft vulnerabilities have been added to the Purple Fox EK, showing ongoing development. The Purple Fox exploit kit (EK) has added two new exploits targeting critical- and ...
The decision by Internet Security Systems Inc. (ISS) research analyst Michael Lynn to speak at this week’s Black Hat USA conference about how unpatched Cisco routers can be remotely compromised has ...
Microsoft researchers have analyzed a new piece of Mac malware that uses a multi-stage attack similar to typical Windows malware infection routines. In a post titled "An interesting case of Mac OSX ...
A sophisticated, two-phase attack that hides in PDF documents could be the first in a long line of exploits that target vulnerabilities in Adobe applications, researchers said this week. In a blog ...
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and ...