all InfoSec news
Inside Win32k Exploitation: Background on Implementations of Win32k and Exploitation Methodologies
June 13, 2023, 1 p.m. | Shawn Westfall
Unit42 unit42.paloaltonetworks.com
We analyze Microsoft Windows' GUI, how it functions and some of the history of research into its exploitation.
The post Inside Win32k Exploitation: Background on Implementations of Win32k and Exploitation Methodologies appeared first on Unit 42.
cortex xdr cve-2021-1732 cve-2022-21882 exploitation functions gui history microsoft microsoft windows research unit 42 vulnerability win32k windows
More from unit42.paloaltonetworks.com / Unit42
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
SITEC- Systems Security Administrator- Camp HM Smith
@ Peraton | Camp H.M. Smith, HI, United States
Cyberspace Intelligence Analyst
@ Peraton | Fort Meade, MD, United States
General Manager, Cybersecurity, Google Public Sector
@ Google | Virginia, USA; United States
Cyber Security Advisor
@ H&M Group | Stockholm, Sweden
Engineering Team Manager – Security Controls
@ H&M Group | Stockholm, Sweden