COM Objects Hijacking
The COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escalation in target systems. It relies on manipulating Component Object Model (COM), exploiting the core architecture of Windows that enables communication between software components, by adding a new value on a specific registry key related […] more…Understanding Google’s Blacklist – Cleaning Your Hacked Website and Removing From Blacklist
Today we found an interesting case where Google was blacklisting a client’s site but not sharing the reason why. The fact they were sharing very little info should not be new, but what we found as we dove a little deeper should be. The idea is to provide you webmasters with the required insight to […] more…More information
- Gamer swatted while live-streaming on Twitch.TV
- Over a million WordPress websites at risk because of flaw in popular SEO plug-in
- Rove Digital Coder Pleads Guilty
- PF Chang’s says breach was ‘highly sophisticated criminal operation’
- Predator Spyware Resurfaces With Fresh Infrastructure
- USB Type-C cable plugs to be reversible
- Global cybercrime prosecution a patchwork of alliances
- Smart Grid Attack Scenarios
- Google Play Apps Expose Tens of Millions to Adware: Sophos
- Anatomy of a phish – a "generic mass targeted attack" against WordPress admins