the art of hiding in windows

The Art of Hiding in Windows (EBook)

the art of hiding in Windows encompasses a range of advanced techniques that allow malware to operate stealthily and resist detection and removal efforts. The key findings highlight the innovative and diverse methods used by modern malware to evade security measures, emphasizing the need for advanced and comprehensive security solutions to counter these threats. API…

Read More
secret of system32

Secret of System32

The Windows operating system, a cornerstone of personal and professional computing, is underpinned by a myriad of critical files that ensure its seamless operation. Central to this intricate web of files is the System32 directory, a vital component that houses essential system files and libraries. While many users might never interact directly with this directory,…

Read More
Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Week in Overview(14 Sep-19 Sep) Technical Summary Silent Skimmer Campaign CVE-2023-34040 – Spring Kafka Deserialization RCE Vulnerability North Korean Lazarus Group’s Involvement in Cryptocurrency Hacks Microsoft AI Data Exposure of 38 Terabytes Exploitation of “search-ms” URI Protocol Handler Distributing XWorm Malware Lumma Stealer Malware Variant (14.09) Detection and Mitigation Key Findings it is crucial for…

Read More
Pi-hole Attack Surface

Pi-hole Attack Surface EBook

A network-wide ad-blocking tool with the capability to execute arbitrary commands. Executive Summary Path Traversal to RCE via teleporter.php and zip_file Parameter: The teleporter.php script in Pi-hole and zip_file parameter, which handles the import and export of settings, contains a vulnerability in its file upload functionality. The application does not adequately validate the contents and…

Read More
Threat Intel Roundup: XWiki, cl0p, HTML Sumggling

Threat Intel Roundup: XWiki, cl0p, HTML Smuggling

XWiki Remote Code Execution (CVE-2023-35150) The XWiki vulnerability (CVE-2023-35150) involves improper input validation within the “Invitation Application.” Authenticated attackers can exploit this flaw by manipulating requests, leading to arbitrary code execution. XWiki’s scripting feature, used to create web applications, includes an “Invitation Application” facilitating email notifications for user registration. The vulnerability arises when unvalidated user…

Read More
Threat Intel Roundup: Winrar, Discord, USDC Holdings

Threat Intel Roundup: Winrar, Discord, USDC Holdings

Technical Summary WinRAR CVE-2023-40477 RCE CVE-2023-40477 is a Remote Code Execution (RCE) vulnerability in WinRAR, a popular Windows file archiver utility. This high-severity flaw is attributed to inadequate validation of user-supplied data in the processing of recovery volumes. Attackers exploit this vulnerability by crafting specially designed RAR archive files. When a victim opens the malicious…

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.