Threat Research
Data Exfiltration Via IPv6 | Avast
Within the Aposemat Team, we’ve been working on testing the capabilities of IPv6 and how malware could take advantage of it. One of the topics we explored was exfiltration of data via ...
The 4 strategic goals behind recent Iranian cyber attacks
Since the Iranian revolution and the establishment of the current Islamic Republic in 1979, Iranian leadership has been in near constant conflict with the West and several of its Middle Eastern neighbors ...
Russian cyber attack campaigns and actors
Updated October 26, 2020. Despite lacking the national wealth and technological prowess of their Western rivals, the Russian intelligence services have proven to be one of the shrewdest, most effective — and ...
Five Attack Scenarios That Could Alter the U.S. Election
On October 21, the FBI held a press conference alerting U.S. citizens about new details concerning nation-state interference with the upcoming U.S. elections. According to news reports attackers have gained access to ...
PayPal Request Money | Avast
Our team recently came across an email that was reported to us by one of our board members as a potential spearphishing attempt. The email was purportedly sent from PayPal, and the ...
Setting up a Virtual Machine for Your CTF Toolbox
You may have seen some Capture the Flag (CTF) writeups on the Hurricane Labs blog recently! If you’re wondering how to get started yourself, this blog post will help you set up ...
Anti-Virus Vulnerabilities: Who’s Guarding the Watch Tower?
This blog entry is a special anti-malware edition showcasing how the most common bugs security products suffer from can allow a standard user to escalate into a privileged user. What we found ...
Keep Your PlayStation Secure | Avast
As Covid-19 has forced many of us to stay home more than usual, an increasing number has started looking for in-house entertainment. Putting it simply, people are gaming — a lot ...
Tales from the Front Lines: Whitelist and Forget, A Cautionary Tale
Stopping attackers and their malicious intent is every security practitioners’ goal. But there are times when we need to grant unfettered access to network resources for day-to-day operations. Better known as whitelisting, ...
IP Camera App Security Test | Avast
Recently, our research team looked into the account security of app companions belonging to ten IP cameras. Each of these cameras have been listed on Amazon’s “hot new releases” and “best seller” ...
