2022-09-22 | Xavier Mertens | RAT Delivered Through FODHelper |
2022-06-04 | Guy Bruneau | Spam Email Contains a Very Large ISO file |
2022-05-20 | Xavier Mertens | A 'Zip Bomb' to Bypass Security Controls & Sandboxes |
2020-12-29 | Jan Kopriva | Want to know what's in a folder you don't have a permission to access? Try asking your AV solution... |
2020-11-25 | Xavier Mertens | Live Patching Windows API Calls Using PowerShell |
2020-04-04 | Didier Stevens | New Bypass Technique or Corrupt Word Document? |
2019-12-26 | Xavier Mertens | Bypassing UAC to Install a Cryptominer |
2019-11-08 | Xavier Mertens | Microsoft Apps Diverted from Their Main Use |
2019-07-25 | Rob VandenBrink | When Users Attack! Users (and Admins) Thwarting Security Controls |
2017-03-05 | Didier Stevens | Another example of maldoc string obfuscation, with extra bonus: UAC bypass |
2016-12-13 | Xavier Mertens | UAC Bypass in JScript Dropper |
2016-11-16 | Xavier Mertens | Example of Getting Analysts & Researchers Away |
2015-06-16 | John Bambenek | CVE-2014-4114 and an Interesting AV Bypass Technique |
2014-03-13 | Daniel Wesemann | Identification and authentication are hard ... finding out intention is even harder |
2013-09-18 | Rob VandenBrink | Cisco DCNM Update Released |
2012-05-08 | Bojan Zdrnja | Windows Firewall Bypass Vulnerability and NetBIOS NS |
2008-04-22 | donald smith | Symantec decomposer rar bypass allowed malicious content. |