GoSecure Blog
IDC Technology and Customer Spotlights
A few months ago, the International Data Corporation (IDC) conducted a Technology Spotlight and a Customer Spotlight on our company. The two reports: Advanced Managed Security in a New Era: Simple Steps to Rapid Response Advanced Managed Security and Yellow Pages: Better Security, Great User Experience reaffirm our position as a high-quality provider of managed security services, one that follows a flexible and customer-centric approach.
Chaos: a Stolen Backdoor Rising Again
This post describes a backdoor that spawns a fully encrypted and integrity checked reverse shell that was found in our SSH honeypot, and that was presented at GoSec 2017 in Montreal. We named the backdoor ‘Chaos’, following the name the attacker gave it on the system. After more research, we found out this backdoor was originally part of the ‘sebd’ rootkit that was active around 2013.
Our Experience around Fake Follower Factories
Last Saturday, January 27th, the New York Times published a detailed article on the sales of automated likes and follows by an American company called Demuvi. The same day, a New York attorney general announced that he opened an investigation on the company, which sold millions of fake followers on social networks.
Why you should consider Kotlin for Burp extension development
Author: Philippe Arteau This small article is an opinion piece to explain why we find the Kotlin language interesting. Its benefits applied to Burp extension development. Security professionals might not be aware of Kotlin. However, it is becoming a trending language...
VMware Horizon (V4H/V4PA) desktop agent privilege escalation vulnerability (CVE-2017-4946)
As virtualization technology continues to become the corporate standard, the popularity of Virtual Desktop Infrastructure (VDI) in large enterprises has been increasing. These automated environments can provision desktops and applications from the internal and external network on top of virtualization technology without an IT administrator’s input.