
CipherTechs, Inc.
@CipherTechs
Followers
371
Following
115
Media
59
Statuses
694
CipherTechs is a global Cyber Security service provider founded in 2001 that remains privately held with headquarters in New York City.
New York, NY
Joined May 2010
CipherTechs discovered an admin authentication bypass 0day in JFrog Artifactory. Patches and work around are available. Be sure to find out if your in-house dev team uses Artifactory. Shout-outs to @jfrog for their vuln disclosure process!.
0
2
1
RT @mariuszbit: - ". and then he said to sign my malware.exe with faked Microsoft cert to evade AVs/EDRs. Would you believe?". ( ̄y▽ ̄)╭ Oh….
0
99
0
there's been a few of these. Along with patching, be sure to remove management interfaces from the Internet.
cisa.gov
0
0
0
WSO2 exploit for CVE-2022-29464 is now public Patch details here
github.com
WSO2 RCE (CVE-2022-29464) exploit and writeup. Contribute to hakivvi/CVE-2022-29464 development by creating an account on GitHub.
0
0
0
RT @vxunderground: LAPSUS$ extortion group claims to have breached @Okta. They have released 8 photos as proof. The photos we are sharing….
0
266
0
RT @SecureWorld: Sandy Bacik, Director of Audit and Compliance at @CipherTechs, will present on PCI 4.0 next week at SecureWorld Philadelph….
0
2
0
container escape "Containers running with AppArmor, SELinux or Seccomp are protected".
unit42.paloaltonetworks.com
CVE-2022-0492 is the third recent kernel vulnerability that allows malicious containers to escape. We offer root cause analysis and mitigations.
0
0
0
Polkit LPE. Reminder to make removing setuid part of your standard Linux builds.
blog.qualys.com
CVE-2021-4034, a PwnKit vulnerability, lets unprivileged users gain root access via pkexec. Explore its impact and how to mitigate the risk.
0
0
0
RT @TheDFIRReport: Can confirm!. ➡️Splashtop.SRUtility.exe. ➡️AnyDesk.AnyDesk.exe.AnyDeskMSI.exe. ➡️Atera.AteraAgent.exe.AgentPackageSTRemo….
0
51
0