Security News > 2015 > June > Future attacks: Hiding exploit code in images (Help Net Security)
2015-06-02 09:28
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated at the Hack...
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/uevGXEEY0Lw/secworld.php
Related news
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit (source)
- Critical Ivanti RCE flaw with public exploit now used in attacks (source)
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- EDRSilencer red team tool used in attacks to bypass security (source)
- ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks (source)
- Exploit released for new Windows Server "WinReg" NTLM Relay attack (source)
- Emergency patch: Cisco fixes bug under exploit in brute-force attacks (source)
- Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar (source)