X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
The Evolution Of Protected Processes Part 2: Exploit/Jailbreak Mitigations, Unkillable Processes And Protected Services

The Evolution of Protected Processes Part 2: Exploit/Jailbreak Mitigations, Unkillable Processes and Protected Services

In this continuing series on the improvements of the protected process mechanism in Windows, we’ll move on past the single…

READ MORE
Analysis Of A CVE-2013-3906 Exploit

Analysis of a CVE-2013-3906 Exploit

Many of CrowdStrike’s customers are often targeted by email phishing campaigns and strategic web compromises (also known as watering-hole attacks).…

READ MORE
What Has Been Accomplished On Cyber Legislation?

What Has Been Accomplished on Cyber Legislation?

In response to the growing cyber threat, Congress has been busy drafting legislation.  Last year alone our representatives introduced more…

READ MORE
The Evolution Of Protected Processes – Part 1: Pass-the-Hash Mitigations In Windows 8.1

The Evolution of Protected Processes – Part 1: Pass-the-Hash Mitigations in Windows 8.1

It was more than six years ago that I first posted on the concept of protected processes, making my opinion of this poorly…

READ MORE
KASLR Bypass Mitigations In Windows 8.1

KASLR Bypass Mitigations in Windows 8.1

As some of you may know, back in June of 2013, I gave a talk at Recon, a security conference in Montreal, about…

READ MORE
Adwind RAT Rebranding

Adwind RAT Rebranding

In November, 2013, the popular and widely used Java RAT named Adwind began being sold under the new name UNRECOM…

READ MORE
VICEROY TIGER Delivers New Zero-Day Exploit

VICEROY TIGER Delivers New Zero-Day Exploit

On November 5, 2013, Microsoft announced that a vulnerability in the Microsoft Graphics Component could allow Remote Code Execution (RCE). This announcement…

READ MORE
Regional Conflict And Cyber Blowback

Regional Conflict and Cyber Blowback

The Internet has changed many aspects of modern life, from communication with friends to how we watch TV or listen…

READ MORE
Mitigating Pass The Hash (PtH)

Mitigating Pass the Hash (PtH)

To look back one year in the life of technology is a long time, so 16 years could be considered…

READ MORE
DNS – The Lifeblood Of Your Domain

DNS – The Lifeblood of your Domain

As the situation on the ground in Syria continues to deteriorate, the Syrian Electronic Army (SEA) has made quite a…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial