BoundHook Attack Exploits Intel Skylake MPX Feature

A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.Original Article

Leave a Reply

Your email address will not be published. Required fields are marked *