ProxyNotShell– the story of the claimed zero days in Microsoft Exchange

Yesterday, cybersecurity vendor GTSC Cyber Security dropped a blog saying they had detected exploitation of a new Microsoft Exchange zero… | Continue reading


@doublepulsar.com | 1 year ago

The hard truth about ransomware (2021)

I’ve talked about ransomware and extortion attacks on organizations for about a decade. I recently spent a year at Microsoft in Threat… | Continue reading


@doublepulsar.com | 1 year ago

Follina – a Microsoft Office code execution vulnerability

Two days ago, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus: | Continue reading


@doublepulsar.com | 1 year ago

Follina – a Microsoft Office code execution vulnerability

Two days ago, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus: | Continue reading


@doublepulsar.com | 1 year ago

BPFDoor – an active Chinese global surveillance tool

Recently, PwC Threat Intelligence documented the existence of BPFDoor, a passive network implant for Linux they attribute to Red Menshen… | Continue reading


@doublepulsar.com | 1 year ago

HiveNightmare a.k.a. SeriousSAM – anybody can read the registry in Windows 10

This is the story of how all non-admin users can read the registry — and so elevate privileges and access sensitive credential information… | Continue reading


@doublepulsar.com | 2 years ago

The hard truth about ransomware: we aren’t prepared, a battle with new rules

I’ve talked about ransomware and extortion attacks on organizations for about a decade. I recently spent a year at Microsoft in Threat… | Continue reading


@doublepulsar.com | 2 years ago

In the wild exploitation of ZeroLogon detected over the 'net on honeypot (2020)

So the title there is exactly as it reads — a few weeks ago I set up a honeypot vulnerable to CVE-2020–1472 aka ZeroLogon. | Continue reading


@doublepulsar.com | 2 years ago

Lockergoga took down Hydro–ransomware used in targeted attacks on business

This week Norsk Hydro, a large multinational manufacturer with 35,000 staff and over 100 years of history, had the nightmare scenario of a… | Continue reading


@doublepulsar.com | 5 years ago

Task Scheduler ALPC exploit high level analysis

Yesterday SandboxEscaper tweeted an local privilege escalation exploit for Windows, which currently has no patch. It’s a really neat flaw… | Continue reading


@doublepulsar.com | 5 years ago

10 things to know before getting into cyber security

I’m old. Like super old. Like 36 old. So I thought it might be nice to give back some things which I’ve learnt over the years about… | Continue reading


@doublepulsar.com | 5 years ago

Thousands of Internet-connected Android devices now have no security

Android has a feature called Android Debug Bridge (ADB for short) which allows developers to communicate with a device remotely, to… | Continue reading


@doublepulsar.com | 5 years ago