COM Objects Hijacking
The COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escalation in target systems. It relies on manipulating Component Object Model (COM), exploiting the core architecture of Windows that enables communication between software components, by adding a new value on a specific registry key related […] more…Understanding Google’s Blacklist – Cleaning Your Hacked Website and Removing From Blacklist
Today we found an interesting case where Google was blacklisting a client’s site but not sharing the reason why. The fact they were sharing very little info should not be new, but what we found as we dove a little deeper should be. The idea is to provide you webmasters with the required insight to […] more…More information
- Over 11,000 jump on European ‘class action’ privacy suit against Facebook
- Two Men Plead Guilty to Hacking Law Enforcement Database for Doxing
- What to Expect on the Day of Your House Move
- Implanted Cisco Routers Targeting Global Networks
- ProtonMail (Wrongly?) Criticized for Disclosing User IP to Authorities
- Schneier: So You Want to be a Security Expert
- Wi-Fi patent troll will only get 3.2 cents per router from Cisco
- Twitter OAuth feature can be abused to hijack accounts, researcher says
- Mac Malware Can Abuse Legitimate Apps to Spy on Users
- Trump’s Twitter Takedown Reveals Another Tech Blind Spot