Read about our expertise areas. We bring world class expertise to solve cyber security challenges.
In short, the operation consists of an information stealer malware that is delivered to targeted victims that primarily operate in the digital marketing and advertisement space.
Configuration Manager often contain information that could be used by an attacker to find new attack paths or credentials that allow lateral movement.
Machine Learning in a Changing World
The only constant in the world nowadays is change. This is no different in machine learning, and the data that machine learning models are trained on. Therefore, developing a machine learning model does not stop once we have trained and deployed the model: we should also monitor the deployed model and data, to make sure that the model keeps performing as expected.
This blog provides a full technical walkthrough for implementing a PoC memory scanner for enumerating timer-queue timers as used in Ekko Sleep Obfuscation (https://github.com/Cracked5pider/Ekko).
Luke Jennings presented at DeepSec ‘09 in Vienna, Austria regarding the security of deployment solutions and some of the recent vulnerabilities he discovered in Symantec’s Altiris Deployment Solution.