BoundHook Attack Exploits Intel Skylake MPX Feature

A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.Original Article

Post Your Comment Here

Your email address will not be published. Required fields are marked *