Isn't it extremely dubious for a security company to run real exploits against systems they don't own? Bitsight is running Citrix exploits which, if the exploit succeeds, can produce a memory leak containing e.g. system credentials Just casually engaging in cybercrime
@SimoKohonen I think it depends on funding and how many Agencies subscribe to their services. Not condoning but testing acceptable limits and definitions of "Crime"? 3rd party risk, 1st party advantages.
@osgo Indeed, with the right buddies you can afford to be more adventurous π
@SimoKohonen Depends, if the exploit is doing like 1 byte leak, no issue but if it's dumping more than a couple of bites then it's a crime in many jurisdictions.
@hackerfantastic Some examples
@SimoKohonen Can't agree more with you.
@SimoKohonen This is illegal in the UK, it certainly runs afoul of the Computer Misuse Act
@SimoKohonen If audited company allows it, itβs not a crime, better us than them π
@SimoKohonen Oops.
@SimoKohonen Business as usual
βΌοΈ New course from Mandiant Academy: Basic Static and Dynamic Analysis. Learn IOCs, investigation workflows, safe environments and analysis techniques. Start your training today π https://bit.ly/3JxgAqC
WTF is this detection for a Cobalt Strike payload? How an analyst is supposed to interpret this?
My intermediate level malware analysis course is there. 60% off for the next two weeks. https://malwareanalysis-for-he...
We need more AI infosec guides, not fewer!!





