TARLOGIC's BLOG
Cybersecurity - Page 4
Cybersecurity articles with security analysis and ethical hacking technics information
Some notes and reflections on the Terminator threat
Throughout the week, a tool called «Terminator» has been discussed in the media, which would allow attackers to disable antivirus, EDR, and XDR platforms. Terminator utilizes a w[...]
Read moreCVE-2023-2825: Critical vulnerability affects Gitlab
Information about a new critical vulnerability affecting Gitlab software has been disclosed. This vulnerability would allow a remote attacker to exploit a path traversal problem to[...]
Read moreCVE-2023-32233: Privilege escalation in Linux Kernel due to a Netfilter nf_tables vulnerability
Recently, a user-after-free vulnerability (CVE-2023-32233) has been published that would allow unprivileged local users to obtain root permissions on Linux Kernel versions 6.3.1 an[...]
Read moreCVE-2023-27363: Proof of concept for remote code execution in Foxit Reader
Following the initial announcement of a critical vulnerability (CVE-2023-27363) which allows remote code execution in Foxit Reader, a functional proof-of-concept has recently been [...]
Read moreFancy Bear and where to find them
Spain has been targeted by several APT (Advanced Persistent Threat) recently [1], amongst which we can find APT-28, also known as Fancy Bear. This group has many different names, d[...]
Read moreBlueTrust, goodbye to Bluetooth privacy
BlueTrust is the name of a new technique developed by Tarlogic that makes it possible to discover trust relationships between Bluetooth devices to obtain data of interest about the[...]
Read moreIoT Security assessment
Discover the IoT security assessment with best practice guides on each of the different stages of an IoT security audir that we have discussed in previous OWASP FSTM methodology ar[...]
Read moreOWASP FSTM, Stage 9: Exploitation of executables
Exploitation of executables is the final step in a firmware analysis, in which an exploit is developed for a vulnerability discovered in earlier phases Vulnerability exploitation o[...]
Read moreOWASP FSTM, step 8: Runtime analysis
Static analysis of the firmware and its executables provides only a limited amount of information about its operation and performing further analysis at that stage is inefficient i[...]
Read moreOWASP FSTM, step 7: Dynamic analysis
The dynamic analysis phase is defined as the study of the running device in a real or emulated environment. For this purpose, the device is analyzed, trying to delve into possible [...]
Read more