Vulnerabilities

Whitespace obfuscation: PHP malware, web shells and steganography

How to deal with whitespace obfuscation and what to be aware of.

Turla Crutch backdoor: analysis and recommendations

Crutch is a newly discovered backdoor from Turla advanced persistent threat (APT), a Russian-linked threat actor, used in a recent cyberattack against an cou

Volodya/BuggiCorp Windows exploit developer: What you need to know

Check Point researchers unveiled the identity of two authors responsible for zero-day attacks on Windows using a novel technique that allows them to recogniz

AWS APIs abuse: Watch out for these vulnerable APIs

In December 2020, Unit 42 researchers at Palo Alto Networks discovered a class of AWS application programming interfaces (APIs) that can be abused to enumera

How to reserve a CVE: From vulnerability discovery to disclosure

What is a CVE? A CVE, meaning Common Vulnerabilities and Exposure, is a publicly reported vulnerability in software products. Vulnerabilities are assigned C

SonicWall firewall VPN vulnerability (CVE-2020-5135): Overview and technical walkthrough

A critical stack-based buffer overflow vulnerability was discovered in SonicWall Network Security Appliance (NSA) VPN. In this article, we will address the p

Top 25 vulnerabilities exploited by Chinese nation-state hackers (NSA advisory)

Introduction China is considered a world leader in cybercrime. It is amongst “the most hacker-active countries” in terms of intensity of outgoing attack tra

Unpatched address bar spoofing vulnerability impacts major mobile browsers

Introduction A number of web browsers have been affected by an address bar spoofing vulnerability that could lead to malware infections and successful spear

Software vulnerability patching best practices: Patch everything, even if vendors downplay risks

Software vulnerability continues to be a challenging cybersecurity risk. Cybercriminals are able to seize on these vulnerabilities and breach systems. The ti