The ‘ModifiedElephant’ threat actors are technically unimpressive, but they’ve evaded detection for a decade, hacking human rights advocates’ systems with dusty old keyloggers and off-the-shelf RATs.
Source: Healthcareitnews.com and Read More
Windows Vulnerability in COM Objects Let Attackers Trigger Remote Command Execution
James Forshaw from Google Project Zero revealed a critical Windows vulnerability in accessing COM objects via the IDispatch interface. This flaw allows attackers to exploit