• caglararli@hotmail.com
  • 05386281520

Understanding DEP as a mitigation technology part 2

Çağlar Arlı      -    0 Views

Understanding DEP as a mitigation technology part 2

In our previous blog post, we explained how DEP works and how to determine if / how a process opted-in to DEP. Now we will demonstrate how DEP can be used to mitigate the risk of a real-world attack. We published a security advisory in February describing an Excel vulnerability in fully-patched Excel being used in limited targeted attacks.