Data Exfiltration Via IPv6 | Avast

| | Threat Research
Within the Aposemat Team, we’ve been working on testing the capabilities of IPv6 and how malware could take advantage of it. One of the topics we explored was exfiltration of data via ...

The 4 strategic goals behind recent Iranian cyber attacks

| | Threat Research
Since the Iranian revolution and the establishment of the current Islamic Republic in 1979, Iranian leadership has been in near constant conflict with the West and several of its Middle Eastern neighbors ...

Russian cyber attack campaigns and actors

Updated October 26, 2020. Despite lacking the national wealth and technological prowess of their Western rivals, the Russian intelligence services have proven to be one of the shrewdest, most effective — and ...
Five Attack Scenarios That Could Alter the U.S. Election

Five Attack Scenarios That Could Alter the U.S. Election

On October 21, the FBI held a press conference alerting U.S. citizens about new details concerning nation-state interference with the upcoming U.S. elections. According to news reports attackers have gained access to ...

PayPal Request Money | Avast

| | Threat Research
Our team recently came across an email that was reported to us by one of our board members as a potential spearphishing attempt. The email was purportedly sent from PayPal, and the ...
b00t2root CTF: cuz rsa is lub [RSA Cryptography]

Setting up a Virtual Machine for Your CTF Toolbox

| | Infosec Blog, security, Threat Research
You may have seen some Capture the Flag (CTF) writeups on the Hurricane Labs blog recently! If you’re wondering how to get started yourself, this blog post will help you set up ...
Anti-Virus Vulnerabilities: Who’s Guarding the Watch Tower?

Anti-Virus Vulnerabilities: Who’s Guarding the Watch Tower?

| | Threat Research
This blog entry is a special anti-malware edition showcasing how the most common bugs security products suffer from can allow a standard user to escalate into a privileged user. What we found ...

Keep Your PlayStation Secure | Avast

| | Threat Research
As Covid-19 has forced many of us to stay home more than usual, an increasing number has started looking for in-house entertainment. Putting it simply, people are gaming — a lot ...

Tales from the Front Lines: Whitelist and Forget, A Cautionary Tale

Stopping attackers and their malicious intent is every security practitioners’ goal. But there are times when we need to grant unfettered access to network resources for day-to-day operations. Better known as whitelisting, ...

IP Camera App Security Test | Avast

| | Threat Research
Recently, our research team looked into the account security of app companions belonging to ten IP cameras. Each of these cameras have been listed on Amazon’s “hot new releases” and “best seller” ...