White Papers
-
Uber / Rockstar Hack
What We Know In the third quarter of 2022, information indicating potential data breaches at both Uber and…
-
ProxyNotShell in a NutShell
Introduction ProxyNotShell is composed of two CVEs, which allow for authenticated remote code execution in Microsoft Exchange versions:…
-
Binary Exploitation Techniques
Introduction ‘Low-level memory exploitation’ involves leveraging memory implementation flaws to access restricted data, elevate privileges or gain remote…
-
Root Detection Bypass
Introduction The purpose of “root detection” is to increase application security by ensuring that programs are run inside…