Analysis of two critical Windows flaws under active exploitation: the zero-day in the Windows Shortcut (.lnk) format with no available patch, and the WSUS vulnerability with a recent but failed patch. Read
Analysis of the EtherHiding technique: The next generation of 'bulletproof' malware hosting that leverages blockchain immutability and anonymity to evade detection and takedown. Read