Chen ErlichCVE-2020–5144 — SonicWall Global VPN New Elevation of Privileges VulnerabilityAs the rippling effects of the COVID-19 pandemic continue to cause disruption to our daily functions — in particular our work life — we…Mar 22, 2022Mar 22, 2022
Chen ErlichGateway2Hell — Multiple Privilege Escalation Vulnerabilities in Citrix Gateway Plug-InAt the time of writing, the COVID-19 pandemic continues to have rippling effects on our day to day, in particular our work life. One of…Mar 22, 2022Mar 22, 2022
Chen ErlichCVE-2020–17365 — Hotspot Shield VPN New Privilege Escalation VulnerabilityDue to permissive access rights on a log folder, set by Hotspot Shield VPN Client, a popular consumer VPN, an unprivileged user could…Mar 22, 2022Mar 22, 2022
Chen ErlichGame of Trojans: Dissecting the #Khalesi Infostealer MalwareThe first technical write-up on the Khalesi infostealer malware, known also as KPOT.Apr 8, 2020Apr 8, 2020
Chen ErlichThreat Hunting using YETI and Elastic StackCombining YETI, an open-source threat intelligence project, with Elastic Stack is a great way to simplify and enhance the work performed byApr 8, 2020Apr 8, 2020
Chen ErlichenSilo Terminates DLL Search Order HijackingSource: ensilo.com/BreakingMalware Twitter: @chen_erlichApr 3, 2020Apr 3, 2020
Chen ErlichThe Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast ExecutableUnveiling a new Brazilian banking campaign, abusing a legitimate Avast executableApr 3, 2020Apr 3, 2020