Skip to main content
Skip to footer
Solutions
Partners
Resources
Contact Us
Book a demo
Solutions
Partners
Resources
Contact Us
Category:
Vulnerabilities
Deceptive Bytes discovers DLL hijacking vulnerabilities in Microsoft’s SysInternals tools
21/02/2022
Background We previously covered DLL Hijacking when we discovered extensive vulnerabilities in .NET, which potentially open any .NET application to…
Deceptive Bytes discovers additional .NET DLL hijacking vulnerability
23/11/2020
Background DLL hijacking (aka spoofing) is an attack on an application where the attacker uses a DLL the application tries…
The “Early Bird Special” – a new twist on the “Early Bird” injection technique
10/10/2019
There are many injection techniques used by malware authors, from simply calling CreateRemoteThread to advance ones like AtomBombing, PROPagate…
Mozilla Firefox vulnerable to injection via Gecko configuration file
09/11/2016
Background Code injection is the exploiting of a bug or a system's design in order to change the behavior of…
Skip to content
Open toolbar
Accessibility tools
Accessibility tools
Enlarge text
Enlarge text
Reducing text
Reducing text
Shades of gray
Shades of gray
High contrast
High contrast
Negative contrast
Negative contrast
Light background
Light background
Links Underline
Links Underline
Readable font
Readable font
Reset
Reset