Mitigation Strategies
Bypass of System Access Controls
This article is part of a series where we look at a recent NSA/CISA Joint Cybersecurity Advisory on the top cybersecurity issues identified during red/blue team exercises operated by these organizations. In ...
Alert: New DLL Variant Used For Malicious Code Execution
Recent research findings have brought to light a new DLL variant pertaining to search order hijacking techniques. As per recent reports, this dynamic link library variant could potentially be used by threat ...
Facing a glibc Vulnerability: Impacts and Mitigation Strategies
Linux vulnerabilities appear frequently and often with severe repercussions. One such concerning issue is a glibc vulnerability. GNU C Library (glibc) is a shared library that serves as the backbone for many ...