A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows

A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows

| | Threat Research
Introduction The topic of memory corruption exploits can be a difficult one to initially break in to. When I first began to explore this topic on the Windows OS I was immediately ...
2021 Predictions and Trends

2021 Cybersecurity Trends: The Emergence of the Personalized Attack Chain

It’s hard to look forward to 2021 without considering the trends that shaped the largely unpopular year known as #2020. History books will, of course, remember this year mostly for two major ...

Don’t be duped by fake domains this Cyber Monday

| | Threat Research
At IronNet, Cyber Monday is about much more than just shopping online — it's the perfect time for some important cybersecurity reminders. That’s why we want to share some of our recent ...
#HITBLockdown D1 - 60 CVEs In 60 Days - Eran Shimony

Intel, Please Stop Assisting Me

| | Threat Research
This post focuses on two vulnerabilities the CyberArk Labs team uncovered in the Intel Support Assistant that affected the millions of Windows machines that run this software. The first vulnerability is of ...
Attacking Kubernetes Clusters Through Your Network Plumbing: Part 1

Attacking Kubernetes Clusters Through Your Network Plumbing: Part 1

Have you ever wondered how the water supply gets into your home and to the taps? Honestly it may not be something you ever thought about. When receiving a system that works ...

Ransomware’s malevolent heyday

| | Threat Research
If there’s ever a time when a type of malware can be labeled as “popular,” this is ransomware’s malevolent heyday. Attackers are clearly taking advantage of desperate times for financial gain and...to ...

Data Exfiltration Via IPv6 | Avast

| | Threat Research
Within the Aposemat Team, we’ve been working on testing the capabilities of IPv6 and how malware could take advantage of it. One of the topics we explored was exfiltration of data via ...

The 4 strategic goals behind recent Iranian cyber attacks

| | Threat Research
Since the Iranian revolution and the establishment of the current Islamic Republic in 1979, Iranian leadership has been in near constant conflict with the West and several of its Middle Eastern neighbors ...

Russian cyber attack campaigns and actors

Updated October 26, 2020. Despite lacking the national wealth and technological prowess of their Western rivals, the Russian intelligence services have proven to be one of the shrewdest, most effective — and ...
Five Attack Scenarios That Could Alter the U.S. Election

Five Attack Scenarios That Could Alter the U.S. Election

On October 21, the FBI held a press conference alerting U.S. citizens about new details concerning nation-state interference with the upcoming U.S. elections. According to news reports attackers have gained access to ...