Threat Research

Your Network Through the Eyes of a Hacker

I’m sure your network’s security is top-notch. You must have already taken care of micro-segmentations, strict firewall policies, and have…

3 months ago

An Introduction to Hardware Hacking

With the introduction of more and more IOT and embedded devices in the market, hackers are starting to find firmware…

3 months ago

Running Sensitive Apps in WSL: (SAFE + SAFE) < SAFE

This blog is intended to be a warning bell and to draw attention to a potential security risk involved in…

4 months ago

Make Memcpy Safe Again: CodeQL

Last February, I went to #OffensiveCon20 and, as you might expect, it was awesome. The talks were great, but the…

4 months ago

Fake Malwarebytes Installation Files Distributing Coinminer | Avast

On Friday, August 21, 2020, we began detecting fake Malwarebytes installation files containing a backdoor that loads a Monero miner…

4 months ago

Here’s Why JavaScript-Based Bot Detection Doesn’t Work. Is Your Site Listed Here?

We’ve been working with a client who was getting hit with wave after wave of bot attacks that were easily…

4 months ago

Using Kubelet Client to Attack the Kubernetes Cluster

In this blog post, we are going to look at the Kubernetes agent, kubelet (see Figure 1), which is responsible…

4 months ago

DIY: Hunting Azure Shadow Admins Like Never Before

TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing…

5 months ago

Why Emotet Remains An Active Threat | Avast

One of the longest-running and more lethal malware strains has once again returned on the scene. Called Emotet, it started…

5 months ago

DIY: Hunting Azure Shadow Admins Like Never Before

TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing…

5 months ago