In ATI, Polymorphic malware refers to samples of malware derived from a common malicious codebase that are changed in order to evade detection while remaining functionally malicious. The samples can h
ProxyShell is a new attack surface on Microsoft Exchange server discussed back in 2021 Black Hat USA conference [1]. According to Unit 42 analysis [3] by Palo Alto, ProxyShell was used 55% of the time
What’s all the Fuss? CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) RCE vulnerability has taken the internet by storm with it being still a zero day since its discovery on March 27. T
Spring4shell or SpringShell, the supposed Log4J equivalent for Spring that took the internet by storm after a couple tweets was published by a Chinese twitter account on March 29, 2022. Now, as things
With the recent events, there have been speculations [1] regarding increasing cybersecurity attacks on organizations by the threat actors. Amidst the speculations, name of a CVE which has popped up is
Recently, a CVE for Microsoft Windows HTTP protocol stack was publicly disclosed where a remote, unauthenticated attacker can cause a full compromise of the system. It affects various Windows versions
Network Visibility + Security
ATI Polymorphic Android Malware
Ayan Saha 2022.12.23
11 min read
#Network Security #Cybersecurity
Network Visibility + Security
ProxyShell: Deep Dive into the Exchange Vulnerabilities
Ayan Saha 2022.08.29
14 min read
#Network Security #Cybersecurity
Network Visibility + Security
Keysight’s Take on CVE-2022-30190 MSDT Follina Exploit
Ayan Saha 2022.06.07
9 min read
#Network Security #Cybersecurity
Network Visibility + Security
Keysight’s Take on Spring4Shell
Ayan Saha 2022.04.25
9 min read
#Network Security #Cybersecurity
Network Visibility + Security
CVE-2020-17144 : Microsoft Exchange Server EWS Insecure Deserialization
Ayan Saha 2022.03.10
8 min read
#Network Security #Cybersecurity
Network Visibility + Security
CVE-2022-21907: Microsoft Windows HTTP protocol DOS vulnerability
Ayan Saha 2022.02.07
6 min read
#Network Security #Cybersecurity