Archive for the ‘sandbox bypass’ Category

Windows Built-in Antivirus Gets Secure Sandbox Mode – Turn It ON

October 29th, 2018
Microsoft Windows built-in anti-malware tool, Windows Defender, has become the very first antivirus software to have the ability to run inside a sandbox environment. Sandboxing is a process that runs an application in a safe environment isolated from the rest of the operating system and applications on a computer. So that if a sandboxed application gets compromised, the technique prevents its

Posted in anti malware, Anti-virus, antimalware, antivirus, Antivirus Sandbox, Best Antivirus, cybersecurity, microsoft, Microsoft Antivirus, sandbox, sandbox bypass, sandboxing, windows antivirus, Windows Defender | Comments (0)

Zerodium Offers $100,000 for Flash Zero-Day Exploit that Bypasses Mitigations

January 5th, 2016

A well-known company popular for buying and selling zero-day vulnerabilities is now offering up to $100,000 for providing a working zero-day exploit for bypassing the Flash Player’s Heap Isolation mitigation.

Few months back, Adobe deployed Heap Isolation in Flash version 18.0.0209 with an aim at making the Use-After-Free (UAF) vulnerabilities more difficult for cybercriminals to exploit.

Posted in Adobe Flash Player, Flash exploit, Flash Player Update, hacking news, sandbox bypass, Use-After-Free Vulnerabilities, Vulnerability, zero-day exploit, Zero-Day Vulnerability, zerodium | Comments (0)

DRAM Rowhammer vulnerability Leads to Kernel Privilege Escalation

March 10th, 2015

Security researchers have find out ways to hijack the Intel-compatible PCs running Linux by exploiting the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system.

The technique, dubbed “rowhammer”, was outlined in a blog post published Monday by Google’s Project Zero security initiative

Posted in DRAM RowHammer Vulnerability, hacking news, Kernel Privilege Escalation, Linux hacking, memory bit flipping, memory hack, RAM hacking, sandbox bypass, Vulnerability, Zero-Day Vulnerability | Comments (0)