A new defense against kernel-mode exploits
by Zeljka Zorz - Managing Editor - Tuesday, 17 June 2014.
Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code targeting the kernel - even when we employ layered security and stack them one upon the other.

The time has come to change the security paradigm and architecture, say Rafal Wojtczuk and Rahul Kashyap. "Windows kernel vulnerabilities are frequent, and this is not going to change anytime soon," they say. "We have to live with them and be able to defend against them."

In this podcast recorded at Hack In The Box Amsterdam 2014, they propose a solution to the problem.

Press the play button below to listen to the podcast:

Rafal Wojtczuk, Principal Security Architect at Bromium, has specialized in kernel and virtualization security, over the years he has disclosed many security vulnerabilities in popular operating system kernels and virtualization software. He is also the author of libnids, a low-level packet reassembly library.

Rahul Kashyap is Chief Security Architect, Head of Security Research at Bromium. Before joining Bromium, he led the worldwide Vulnerability Research teams at McAfee Labs. He has led cyber defense technologies focused on exploit prevention and mitigation for both host and network related products.


VPN protocol flaw allows attackers to discover users' true IP address

The team running the Perfect Privacy VPN service has discovered a serious vulnerability that affects all VPN providers that offer port forwarding, and which can be exploited to reveal the real IP address of users.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Mon, Nov 30th