-
Return of the mac(OS): Transparency, Consent, and Control (TCC) Database Manipulation
Read MoreAs the macOS desktop user base continues to grow year by year, adversaries are adapting their strategies to become more cross-platform. Gone are the days when macOS was considered immune to malware. This report delves into the evolving landscape of cyber threats, focusing on adversarial techniques aimed at manipulating the Transparency, Consent, and Control (TCC) framework database.
-
Windows Phantom DLL Hijacking: Turning “Nonexistent” DLLs into Real Threats
Read MoreThe Windows operating system (OS) references a surprising number of DLL files that do not exist. Thus, phantom DLL hijacking occurs when the adversary names their malicious DLL to match the non-existent file and writes it to the specified location of one these referenced missing files.
-
Omdia Research Report: On the Radar with Interpres Security
Read MoreLearn more about the Interpres Threat Exposure Management Platform offers effective ways to identify and remediate cyber threats in this Omdia research report.
Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure. The Interpres Threat Exposure Management Platform analyzes the dynamic relationship between defensive and adversarial capabilities, assets, and their exploitable vulnerabilities; prioritizes the required defensive actions; and optimizes the security environment, to provide continuous threat exposure management.