Tag selected: research

The RECON Vulnerability and related TTPs
Key takeaways  CVE-2020-6287 is a vulnerability present in SAP NetWeaver software that hinges on a missing authentication check. Successful weaponization of this vulnerability would allow attackers to abuse internet-facing SAP systems in a way that enables them to gain control over critical business processes. Numerous threat actors would be...
Community Newsletter July 2020
Blueliv Threat Exchange Network: July IOC highlights Connection discovered between Chinese hacker group APT15 and defense contractor Cyber-security firm Lookout said it found evidence connecting Android malware that was used to spy on minorities in China to a large government defense contractor from the city of Xi’an. Lookout’s report details...
Escape from the Maze – Part 2
In the last article, we have covered the obfuscation techniques used by one of the loaders used by the Maze ransomware. It is recommended to read it before you start with the Maze DLL. In this article we will analyze in detail the obfuscation techniques used by the Maze...
Demo Free Trial MSSP
Program