Metasploit Multiple Browsers Obfuscation Technique

Remote attackers can use metasploit modules in order to check for potential browser vulnerabilities on a target client. This information can later be used for attacks.

from Check Point Update Services Advisories http://ift.tt/2jpcyAF

No comments:

Post a Comment

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...