Shrouded Snooper Analysis Report

Shrouded Snooper Analysis Report

The ceaseless march of technology can sometimes be shadowed by darker pursuits. The 19th of September 2023 will be marked in the annals of cybersecurity, a day when the distinguished team at Cisco Talos laid bare the workings of a fresh malware family named HTTPSnoop. This revelation carries with it profound implications for telecommunications providers, particularly in the Middle East.

Read More
the art of hiding in windows

The Art of Hiding in Windows (EBook)

the art of hiding in Windows encompasses a range of advanced techniques that allow malware to operate stealthily and resist detection and removal efforts. The key findings highlight the innovative and diverse methods used by modern malware to evade security

Read More
the art of hiding in windows

The Art Of Hiding In Windows

The intricate dance between cyber defenders and adversaries plays out daily in the vast digital playground of the Windows operating system. As the dynamics of this age-old game evolve, the strategies employed by both sides have grown increasingly nuanced. The line between cybersecurity professionals and cybercriminals blurs when it comes to mastering the art of evasion within Windows. In this deep dive, we’ll unpack the tactics, techniques, and procedures that render these actors invisible in plain sight.

Read More
secret of system32

Secret of System32

The Windows operating system, a cornerstone of personal and professional computing, is underpinned by a myriad of critical files that ensure its seamless operation. Central to this intricate web of files is the System32 directory, a vital component that houses

Read More
Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Week in Overview(14 Sep-19 Sep) Technical Summary Silent Skimmer Campaign CVE-2023-34040 – Spring Kafka Deserialization RCE Vulnerability North Korean Lazarus Group’s Involvement in Cryptocurrency Hacks Microsoft AI Data Exposure of 38 Terabytes Exploitation of “search-ms” URI Protocol Handler Distributing XWorm

Read More
Pi-hole Attack Surface

Pi-hole Attack Surface EBook

A network-wide ad-blocking tool with the capability to execute arbitrary commands. Executive Summary Path Traversal to RCE via teleporter.php and zip_file Parameter: The teleporter.php script in Pi-hole and zip_file parameter, which handles the import and export of settings, contains a

Read More
Pi-hole Attack Surface

Pi-hole Attack Surface

A network-wide ad-blocking tool with the capability to execute arbitrary commands. Executive Summary Path Traversal to RCE via teleporter.php and zip_file Parameter: The teleporter.php script in Pi-hole and zip_file parameter, which handles the import and export of settings, contains a

Read More
Threat Intel Roundup: Lazarus, Lumma, Superset, RocketMQ

Threat Intel Roundup: Lazarus, Lumma, Superset, RocketMQ

Week in Overview(5 Sep-12 Sep) Technical Summary Key Findings it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate

Read More

Rocket.Chat IOS Application (EBook)

A modern iOS application that exposes your account token and runs arbitrary commands. Executive Summary Exposed API Key in GET URL (/api/v1/users.info?userId): RTLO Character Injection in Chat:

Read More

What Is Rocket.Chat For IOS Application?

In our digital-first era, the dynamic cybersecurity landscape evolves with new threats and vulnerabilities daily. It’s a race between security professionals and cyber adversaries. Two vulnerabilities that have recently emerged concern exposed API keys in URLs and the malicious use of Right-to-Left Override (RTLO) character injections in chat platforms. This article dives deep into understanding these vulnerabilities, their implications, and the best practices to remediate them.

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.