Author: do son

circumventing EDR

Bypass EDR Detection with CrimsonEDR

CrimsonEDR CrimsonEDR is an open-source project engineered to identify specific malware patterns, offering a tool for honing skills in circumventing Endpoint Detection and Response (EDR). By leveraging diverse detection methods, it empowers users to...

RansomHouse ransomware

Double Trouble: RansomHouse’s Extortion Tactics Revealed

The RansomHouse ransomware group exemplifies the sophisticated, profitable, and adaptable nature of modern cyber extortion campaigns. Emerging in late 2021, their operations blend technical efficiency with psychological pressure, maximizing their potential takings. RansomHouse’s double...

AsukaStealer malware

AsukaStealer: Analysis of a New Information-Stealing Malware

The cybersecurity landscape has a new and potent threat to consider: AsukaStealer. This Malware-as-a-Service (MaaS), identified by Cyble Research & Intelligence Labs (CRIL) on February 2, 2024, represents the latest evolution in the cybercriminal...

CVE-2023-6764

Zyxel Security Vulnerabilities: DoS, Command Injection & More

Zyxel’s recent security advisory spotlights multiple vulnerabilities present in select firewall and access point models. Failure to take immediate action could leave these devices open to severe security risks. Vulnerability Breakdown CVE-2023-6397 (Firewalls): Potential denial-of-service...

AutoCAD vulnerabilities

40 Zero-Day Vulnerabilities Found in Autodesk AutoCAD

Autodesk AutoCAD, a widely used CAD software across engineering, architecture, and manufacturing industries, has been found to contain 40 zero-day vulnerabilities. These flaws, if exploited, could potentially allow attackers to execute arbitrary code, compromising...