This article discusses a technique that leverages stack leakage and structured exception handling to bypass Control Flow Guard (CFG). It covers the steps for ex
A detailed analysis of an ongoing cyber attack targeting over 100 businesses in North America exploiting a Windows zero-day vulnerability. Learn about the tacti
Discover the IIS 6.0 Remote Code Execution vulnerability (CVE-2017-7269) identified by Zhiniang Peng and Chen Wu from South China University of Technology. Lear