The questions have started rolling in : how to stop the recent vulnerability discovered in Windows applications termed “Windows DLL hijaking”. This is quite a serious exploit, considering the ease of use of the tools already written to exploit this, and the huge number of applications found to be vulnerable. Add to that the difficulty … Continue reading First line windows DLL hijacking mitigation
Assume that you’ve been hacked…
That’s the title of this recent Forbes.com article. Many, especially management, would ask “where is the hard evidence that our company is hacked? Why should I implement all this security if I’m not being hacked?”. The problem with today’s security landscape is that such hard evidence is difficult to provide before actual security systems are … Continue reading Assume that you’ve been hacked…
You must be logged in to post a comment.