Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

NeedleDropper malware leverages a memory corruption flaw in Microsoft to disseminate

Threat Level – Amber | Vulnerability Report
Download PDF

A new dropper strain dubbed NeedleDropper is used to distribute multiple malware families. The dropper attempts to obfuscate by dumping numerous useless, invalid files and storing critical data within several MB of irrelevant data, and it also uses credible applications to execute.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox