In the ever-evolving world of cybersecurity, companies need to stay ahead of emerging threats and continuously adapt to the changing landscape. Invicti Security, a leading provider of application security solutions, has recently announced a corporate rebrand, emphasizing its commitment to delivering AppSec (Application Security) with zero noise. This rebranding initiativeContinue Reading

In this article, I want to show you how to embed payload in PDF with EvilPDF tool. By the end of the article, you will be able to embed payload in PDF, and get a reverse shell from the victim, hopefully 🙂 EvilPDF is a Linux tool made in pythonContinue Reading

Citrix released builds to fix CVE-2022-27518, which affects the following Citrix ADC (formerly NetScaler) and Citrix Gateway versions: 12.1 (including FIPS and NDcPP) and 13.0 before 13.0-58.32 of Citrix ADC and Citrix Gateway, both of which must be configured with an SAML SP or IdP configuration to be affected. The vulnerability has very highContinue Reading

In recent years, it is very common to share PoC exploits for known vulnerabilities. It is very common to easily find several PoCs for vulnerabilitirs in GitHub. A researcher team from Leiden Institute of Advanced Computer Science announced that they discovered thousands of repositories on GitHub that offer fake PoCContinue Reading

Django is a free and open source Python web framework and maintained by the independent Django Software Foundation. An issue was discovered (CVE-2022-34265) in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. Trunc() and Extract() database functions were subject to SQL injection if untrusted data was used as a kind/lookup_nameContinue Reading

Proofpoint announced that they have discovered a vulnerability in Office 365 that allow attacker to encrypt files stored on SharePoint and OneDrive. Proofpoint also has identified the attack chain as initial access, account takeover & discovery, collection & exfiltration, and monetization. “Once executed, the attack encrypts the files in theContinue Reading

CVE-2022-26809 is a vulnerability exists within the Remote Procedure Call Runtime component in Microsoft Windows. If an attacker successfully exploits the vulnerability, then she/he could run arbitrary code on the affected system. To exploit this vulnerability, an attacker would need to send a specially crafted RPC call to an RPCContinue Reading

For many years, we are using vulnerability scanners to identify security weaknesses and flaws in our internet facing environment. A vulnerability scan is an automated process and critically important for organizations to see what vulnerabilities they have and attackers can use if they target them. Despite all this success, widespreadContinue Reading

On 27th of February, a member of Conti threat group started leaking data from the group, after Conti group announced that they are fully supporting Russia against Ukraine. Leakage process is still going on via “ContiLeaks” Twitter account. Leakage started with unencrypted chat messages between Conti members. On 1st ofContinue Reading

Nucleus and Mandiant announced a strategic partnership about vulnerability intelligence. Through this partnership, Nucleus customers can have access to Mandiant Advantage Vulnerability Intelligence data in real time. “We spent the last year performing a deep dive into the vulnerability intelligence offerings of the leading threat intelligence providers and studying howContinue Reading