Load and Inject Malicious DLL Using Microsoft Tools
Attackers can leverage legitimate Microsoft signed binaries to load and inject malicious DLLs into running processes, effectively bypassing application whitelisting and endpoint security.
Browse our collection of cybersecurity research, threat intelligence reports, and technical analyses.
Attackers can leverage legitimate Microsoft signed binaries to load and inject malicious DLLs into running processes, effectively bypassing application whitelisting and endpoint security.
Cryptojacking has become one of the most prevalent cyber threats, silently hijacking computing resources to mine cryptocurrency. Learn how to detect and prevent these attacks.
Advanced malware can execute PowerShell commands without ever calling powershell.exe, effectively bypassing many endpoint security solutions. This research explores the techniques used and how to …
Dynamic Data Exchange (DDE) is a legitimate Microsoft Office feature that attackers exploit to execute arbitrary commands without requiring macro-enabled documents.
BadRabbit ransomware targeted organizations in Russia, Ukraine, and Eastern Europe through compromised websites using fake Adobe Flash update prompts.
Microsoft HTML Application Host (mshta.exe) and other HTML interpreters can be leveraged by attackers to execute malicious scripts while evading traditional security controls.
NotPetya was one of the most devastating cyber attacks in history, causing over $10 billion in damages worldwide. Our technical analysis reveals why it was …
Virtual Machine Introspection (VMI) provides a powerful approach to malware analysis by monitoring guest OS behavior from the hypervisor level, making it invisible to the …