
Netanel Ben Simon
@netanelbensimon
ID: 1018402181643415552
15-07-2018 07:49:35
48 Tweet
480 Takipçi
76 Takip Edilen

The transition to working remotely has severe security implications, as demonstrated by our new research on this wide-spread clientless solution for remote desktop. See our full paper on Remote Code Execution and Privilege Escalation in Apache Guacamole research.checkpoint.com/2020/apache-gu…


CVE-2020-1350: A cool Windows DNS Server vulnerability (2003->2019) we found at Check Point Research and got patched today #PatchTuesday research.checkpoint.com/2020/resolving…




Our researchers found that CVE-2017-0005, a 0-Day attributed to the Chinese APT31, is a replica of an Equation Group 0-Day, that was caught and repurposed by APT31 during 2014, 3 years before the Shadow Brokers leak. Read the complete story on our blog. research.checkpoint.com/2021/the-story…

Woohoo! research.checkpoint.com/2021/fuzzing-t… "Another great feature of Jackalope is that it is easily customizable and hackable. The process of adding a custom mutator to the fuzzer was pretty straight-forward and increased our fuzzing effectiveness with very little development cost."







We (+Nir Ohfeld) just released the full technical blogpost regarding #ChaosDB - which we also presented today at #BlackHatEurope wiz.io/blog/chaosdb-e…

Today Wiz Research (Shir, Nir Ohfeld, Ronen Shustin and myself) published details on #ExtraReplica, a severe vulnerability that allowed anyone to access the databases of other #Azure customers. Here’s how we did it: 🧵 (1/n) wiz.io/blog/wiz-resea…


[CPR-Zero] Multiple vulnerabilities in OMX ALAC decoder affecting Android devices based on MediaTek and Qualcomm chipsets that can lead to LPE and RCE via malformed audio file. cpr-zero.checkpoint.com/vulns/cprid-21… cpr-zero.checkpoint.com/vulns/cprid-21… cpr-zero.checkpoint.com/vulns/cprid-21…
