Attackers increasingly prefer to leverage legitimate software already present in target environments rather than introducing malicious executables.
At Spektion, our continuous monitoring of software behavior across thousands of products in enterprise environments has revealed a concerning pattern: remotely accessible Named Pipes are far more prevalent than most security teams realize.
Breaking the Cycle of Ineffective Vulnerability Management with its Purpose-Built Solution Harnessing Runtime Insights
On the heels of releasing the macOS sensor earlier this week, its as good a time as ever to dig into some mac specific risks. Having spent the majority of my career attacking Windows its fun to peak under the macOS hood.
One of the more common risks I still see in commercial software is applications that dynamically allocate memory in external processes—for instance, by creating memory pages with both writable and executable permissions.
See Spektion in action with a personalized demo
Ready to Learn More?