BoundHook – Exception Based Kernel-Controlled UserMode Hooking Author: Kasif Dekel, Security Researcher at CyberArk Prologue In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you control over the…
Petya ransomware: What we know, and the rise of Ransomware-as-a-service (RaaS)
The Petya variant of ransomware utilizes a similar, if not somewhat modified, version of EternalBlue exploit—as used by the Wannacry ransomware in May this year—to spread to all active end-points on the affected network. What is Petya, and how does…