Blog

Security software that uses 'code hooking' opens the door to hackers

Some of the intrusive techniques used by security, performance, virtualization, and other types of programs to monitor third-party processes have introduced vulnerabilities that hackers can exploit. Researchers from data exfiltration prevention company enSilo found six common security issues affecting over 15 products when they studied how software vendors use “hooking” to inject code into a process

Read More