logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • ASEC Weekly Malware Statistics (January 30th, 2023 – February 5th, 2023)
  • Major CrackDown – Police Hacked Exclu ‘secure’ Cybercriminal Message Platform
  • Vulnerability Provided Access to Toyota Supplier Management Network
  • OpenSSL fixes High Severity data-stealing bug – patch now!
  • PixPirate – Advanced Android Threat Targets Brazilian Financial Organizations

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-46842 (js_help_desk) 2 February 2023
  • CVE-2022-46815 (conditional_shipping_for_woocommerce) 2 February 2023
  • CVE-2022-45807 (wp_mail_log) 2 February 2023
  • CVE-2022-45067 (exclusive_addons_for_elementor) 2 February 2023
  • CVE-2022-40692 (sunshine_photo_cart) 2 February 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Herpaderping – Process Herpaderping Bypasses Security Products By Obscuring The Intentions Of A Process

Posted on 15 November 2020

From kitploit.com

Process Herpaderping is a method of obscuring the intentions of a process by modifying the content on disk after the image has been mapped. This results in curious behavior by security products and the OS itself.

Read more…

Posted in News

Post navigation

Previous post: Closer look at Windows 10’s new modern disk management tool
Next post: Malwarebytes is kicking Windows printers offline
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.