Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

JPEG

Rare Steganography Hack Can Compromise Fully Patched Websites

26th July 201926th July 2019 peterglock

Attackers are hiding PHP scripts in EXIF headers of JPEG images to hack websites, just by uploading an image. Read the original article here

 backdoor, Be Aware, JPEG, malware, Threatpost, TrustWave  Glock Takes Stock

Recent Posts

  • New Linux, macOS malware hidden in fake Browserify NPM package
  • Capcom: Ransomware gang used old VPN device to breach the network
  • The Locked Shields exercise will place as much focus on grey zone activities as it will on the …
  • FBI nuked web shells from hacked Exchange Servers without telling owners
  • Microsoft Patch Tuesday, April 2021 Edition

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

VAT No: EE102351110

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

11 hours ago

Glock Enterprises Ltd
buff.ly/3a8DektCapcom: Ransomware gang used old VPN device to breach the networkDo you include your backup facilities in your threat modelling and pen test exercises?...:Capcom has released a new update about the ransomware attack it suffered last year, detailing how the hackers gained access to the network, compromised devices, and stole personal information belonging to thousands of individuals.[...]Investigators discovered that Ragnar Locker operators gained access to Capcom’s internal network by targeting an old VPN backup device located at the company’s North American subsidiary in California.[...]Original Article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes