Attackers can execute malicious code undetected by inserting commands into a machine code stored in memory, escaping detection by most security software, according to a team of Japanese researchers from NTT Security and the University of Tokyo. The team was successful in using the technique in in-memory processes in VBScript, Python and Lua interpreters. Improved write protections and limiting memory write to the interpreter were recommended preventative measures. The researchers will present their findings at the forthcoming Black Hat USA conference.

How health systems are future-proofing supply chains
Hospital supply chain leaders are calling for strategies to future-proof supply operations, reduce uncertainty and protect patient care amid rising costs. Here are responses from