
Alexandre Cheron
@axcheron
Followers
2K
Following
1
Media
241
Statuses
13K
Hacker. Security Researcher. Bytes Addict. Became self-aware at 5:32 a.m. Almost Human. Shall we play a game?
Montréal
Joined February 2011
The Guest Who Could: Exploiting LPE in VMWare Tools
swarm.ptsecurity.com
VMWare Tools provides a rich set of drivers and services that enhance manageability of virtual machines and enable guest-host communication. While the host-to-guest RPC mechanisms have long been...
0
0
0
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access #0day
thehackernews.com
Active SharePoint exploits since July 7 target governments and tech firms globally, risking key theft and persistent access.
0
0
0
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
arstechnica.com
Exploits allow hackers to bypass 2FA and commandeer vulnerable devices.
0
0
0
Applocker bypass on Lenovo machines – The curious case of
oddvar.moe
This blogpost is about a minor discovery I made regarding a writeable file inside the Windows folder that is present on Lenovo machines. Initially when I found it I thought it was only a handful of…
0
0
1
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms #Ivanti #0day.
thehackernews.com
Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
0
0
0
Hikvision Canada ordered to cease operations over security risks
bleepingcomputer.com
The Canadian government has ordered Hikvision's subsidiary in the country to cease all operations following a review that determined them to pose a national security risk.
0
0
0
Over 1,200 Citrix servers unpatched against critical auth bypass flaw #Citrix
bleepingcomputer.com
Over 1,200 Citrix NetScaler ADC and NetScaler Gateway appliances exposed online are unpatched against a critical vulnerability believed to be actively exploited, allowing threat actors to bypass...
0
0
0
Instagram ads mimicking BMO, EQ Bank are finance scams
bleepingcomputer.com
Instagram ads impersonating financial institutions like Bank of Montreal (BMO) and EQ Bank (Equitable Bank) are being used to target Canadian consumers with phishing scams and investment fraud. Some...
0
0
0
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability #Linux.
thehackernews.com
CISA warns CVE-2023-0386 is being actively exploited, impacting Linux systems via OverlayFS. Patching is urgent.
0
0
0
Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware #Apple.
thehackernews.com
Apple patched zero-day flaws exploited to deploy Paragon’s Graphite spyware targeting journalists and civil society, raising global spyware concerns.
0
0
0
Streaming Zero-Fi Shells to Your Smart Speaker |.Exploiting the Sonos Era 300 with a Malicious HLS Playlist
blog.ret2.io
In October 2024, RET2 participated in the “Small Office / Home Office” (SOHO) flavor of Pwn2Own, a competition which challenges top security researchers to c...
0
0
2
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them
arstechnica.com
The publicly available exploits provide a near-universal way to bypass key protections.
0
0
0
New 'Defendnot' tool tricks Windows into disabling Microsoft Defender
bleepingcomputer.com
A new tool called 'Defendnot' can disable Microsoft Defender on Windows devices by registering a fake antivirus product, even when no real AV is installed.
1
0
1
Supercharging Ghidra: Using Local LLMs with GhidraMCP via Ollama and OpenWeb-UI
medium.com
Reverse engineering binaries often resembles digital archaeology: excavating layers of compiled code, interpreting obscured logic, and…
0
0
0
Apple 'AirBorne' flaws can lead to zero-click AirPlay RCE attacks
bleepingcomputer.com
A set of security vulnerabilities in Apple's AirPlay Protocol and AirPlay Software Development Kit (SDK) exposed unpatched third-party and Apple devices to various attacks, including remote code...
0
0
0
iOS and Android juice jacking defenses have been trivial to bypass for years
arstechnica.com
New ChoiceJacking attack allows malicious chargers to steal data from phones.
0
0
0
Ghosting AMSI: Cutting RPC to disarm AV
medium.com
In this post, we explore how to bypass AMSI’s scanning logic by hijacking the RPC layer it depends on — specifically the NdrClientCall3…
0
0
0
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
thehackernews.com
ARMO shows io_uring-based rootkits evade Falco, Tetragon, and Defender, risking Linux runtime security.
0
0
0