April 19, 2024, 4:30 a.m. | Shmuel Cohen

Security Boulevard securityboulevard.com

See how a SafeBreach Labs researcher bypassed the anti-tampering mechanism of a leading EDR to execute malicious code within one of the EDR's own processes and altered the mechanism to gain unique, persistent, and fully undetectable capabilities.


The post The Dark Side of EDR: Repurpose EDR as an Offensive Tool appeared first on SafeBreach.


The post The Dark Side of EDR: Repurpose EDR as an Offensive Tool appeared first on Security Boulevard.

capabilities code dark edr labs malicious mechanism offensive own persistent processes researcher safebreach tampering the mechanism tool undetectable

More from securityboulevard.com / Security Boulevard

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France