Chances are you're vulnerable with Microsoft Office
In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.
Buggy package managers, some only on Windows
Researchers found vulnerabilities in some versions of eight popular package managers. We review how an attacker could exploit them and urge everyone to upgrade.
Emotet may be back for the crown as king of malware
Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.
And apply the patches to avoid the PrintNightmare
You can read this post to learn about the nightmare that started to emerge within Windows months ago, which may affect many of its users, including you.
Local Privilege Escalation
In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD.
Bypassing OS protections
In this article we will defeat some protections using several techniques for exploting HackSys Extremely Vulnerable Driver
How to crash Windows
This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver with a Denial of Service
Getting in the deeps of the OS
This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers.
The devil is in the details
This post will show how use reverse engineering techniques and tools to find vulnerabilities on Vulnserver.