Positive Technologies - learn and secure

Pages

▼
December 1, 2020

Linux kernel heap quarantine versus use-after-free exploits

›
It's 2020. Quarantines are everywhere – and here I'm writing about one, too. But this quarantine is of a different kind. In this art...
March 17, 2020

CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem

›
This article discloses exploitation of CVE-2019-18683 , which refers to multiple five-year-old race conditions in the V4L2 subsystem o...
March 5, 2020

Intel x86 Root of Trust: loss of trust

›
The scenario that Intel system architects, engineers, and security specialists perhaps feared most is now a reality. A vulnerability has ...
January 21, 2020

Fileless ransomware FTCODE now steals credentials

›
In 2013, SophosLabs announced infections by a ransomware written in PowerShell . The attack targeted users from Russia. The ransomware encr...
December 17, 2019

Turkish tricks with worms, RATs… and a freelancer

›
The Positive Technologies Expert Security Center has detected a malicious campaign active since at least mid-January 2018. The operation m...
›
Home
View web version
Powered by Blogger.