Threat Research Blog

  • Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability

    Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability

    During a recent customer engagement, the CyberArk Red Team discovered and exploited an Elevation of Privilege (EoP) vulnerability (CVE-2024-39708) in Delinea Privilege Manager (formerly Thycotic...

    Read Blog
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • How to Bypass Golang SSL Verification

    How to Bypass Golang SSL Verification

    Golang applications that use HTTPS requests have a built-in SSL verification feature enabled by default. In our work, we often encounter an application that uses Golang HTTPS requests, and we have...

    Read Blog
  • The Current State of Browser Cookies

    The Current State of Browser Cookies

    What Are Cookies When you hear “cookies,” you may initially think of the delicious chocolate chip ones. However, web cookies function quite differently than their crumbly-baked counterparts....

    Read Blog
  • You Can’t Always Win Racing the (Key)cloak

    You Can’t Always Win Racing the (Key)cloak

    Web Race Conditions – Success and Failure – a Keycloak Case Study In today’s connected world, many organizations’ “keys to the kingdom” are held in identity and access management (IAM) solutions;...

    Read Blog
  • Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality...

    Read Blog
  • Your NVMe Had Been Syz’ed: Fuzzing NVMe-oF/TCP Driver for Linux with Syzkaller

    Your NVMe Had Been Syz’ed: Fuzzing NVMe-oF/TCP Driver for Linux with Syzkaller

    Following research conducted by a colleague of mine [1] at CyberArk Labs, I better understood NVMe-oF/TCP. This kernel subsystem exposes INET socket(s), which can be a fruitful attack surface for...

    Read Blog
  • Crumbled Security: Unmasking the Cookie-Stealing Malware Threat

    Crumbled Security: Unmasking the Cookie-Stealing Malware Threat

    Over the past few years, we’ve seen a huge increase in the adoption of identity security  solutions. Since these types of solutions help protect against a whole range of password-guessing and...

    Read Blog
  • The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    Introduction Welcome, fellow travelers of the Cosmos! While we may not be traversing the stars on a spaceship, we are all interconnected through the powerful network of blockchains. Unfortunately,...

    Read Blog
  • A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    Introduction This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their...

    Read Blog
  • Ransomware’s PLAYing a Broken Game

    Ransomware’s PLAYing a Broken Game

    Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...

    Read Blog
  • SafeNet: Securing Your Network From Yourself

    SafeNet: Securing Your Network From Yourself

    TL;DR Whether working at home or in the office, when conducting cybersecurity research, investigating the dark web forums or engaging with any dangerous part of the internet, staying safe is...

    Read Blog
  • Fuzzer-V

    Fuzzer-V

    TL;DR An overview of a fuzzing project targeting the Hyper-V VSPs using Intel Processor Trace (IPT) for code coverage guided fuzzing, built upon WinAFL, winipt, HAFL1, and Microsoft’s IPT.sys....

    Read Blog
  • NVMe: New Vulnerabilities Made Easy

    NVMe: New Vulnerabilities Made Easy

    As vulnerability researchers, our primary mission is to find as many vulnerabilities as possible with the highest severity as possible. Finding vulnerabilities is usually challenging. But could...

    Read Blog
  • Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition

    Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition

    Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...

    Read Blog
  • A Deep Dive into Penetration Testing of macOS Applications (Part 2)

    A Deep Dive into Penetration Testing of macOS Applications (Part 2)

    Introduction This is the second part of the “A Deep Dive into Penetration Testing of macOS Application” blog series. In the first part, we learned about macOS applications and their structure and...

    Read Blog
  • A Deep Dive into Penetration Testing of macOS Applications (Part 1)

    A Deep Dive into Penetration Testing of macOS Applications (Part 1)

    Introduction As many of us know, there are a lot of guides and information on penetration testing applications on Windows and Linux. Unfortunately, a step-by-step guide doesn’t exist in the macOS...

    Read Blog
  • How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry

    How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry

    TL;DR In this post, we’re going to learn how Foundry can be used to write a proof of concept (PoC) for uninitialized smart contract vulnerabilities. We will take a look at and exploit a simple...

    Read Blog
  • White Phoenix: Beating Intermittent Encryption

    White Phoenix: Beating Intermittent Encryption

    Recently, a new trend has emerged in the world of ransomware: intermittent encryption, the partial encryption of targeted files. Many ransomware groups, such as BlackCat and Play, have adopted...

    Read Blog
  • Fantastic Rootkits and Where to Find Them (Part 2)

    Fantastic Rootkits and Where to Find Them (Part 2)

    Know Your Enemy In the previous post (Part 1), we covered several rootkit technique implementations. Now we will focus on kernel rootkit analysis, looking at two case studies of rootkits found in...

    Read Blog
  • Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 2

    Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 2

    In the previous blog post, we described how the Docker research started and showed how we could gain a full privilege escalation through a vulnerability in Docker Desktop. In this follow-up blog...

    Read Blog
  • loading
    Loading More...