Skip to content
NVISO Labs

NVISO Labs

Cyber security research, straight from the lab! 🐀

  • twitter
  • linkedin
  • mail us
  • our company
  • SSO
  • All
  • Blue Team
  • Cloud Security
    • AWS
    • Azure
    • GCP
    • Microsoft 365
  • Awareness
  • Forensics
  • Other
    • AI Security
    • Application Security
    • IoT Security
    • Web Security
    • Industrial Security
    • Mobile Security
    • Cyber Strategy
    • Purple Team
    • Red Team
    • Events

Author: Maxime Thiebaut

You name it, VMware elevates it (CVE-2025-41244)

NVISO has identified zero-day exploitation of CVE-2025-41244, a local privilege escalation vulnerability impacting VMware's guest service discovery features.

Maxime Thiebaut Vulnerability, Exploitation 72 Comments September 29, 2025September 29, 2025 10 Minutes

Hunting Chromium Notifications

Browser notifications provide social-engineering opportunities. In this post we'll cover the associated forensic artifacts, threat hunting possibilities and hardening recommendations.

Maxime Thiebaut Forensics, Threat Hunting 1 Comment September 6, 2024September 5, 2024 4 Minutes

MEGAsync Forensics and Intrusion Attribution

MEGAsync forensics can be leveraged to identify exfiltrated files, additional victims and, subsequently, perform attribution.

Maxime Thiebaut Tools, Forensics 1 Comment September 4, 2024September 3, 2024 3 Minutes

Covert TLS n-day backdoors: SparkCockpit & SparkTar

This report documents two covert TLS-based backdoors identified by NVISO: SparkCockpit & SparkTar. Both backdoors employ selective interception of TLS communication towards the legitimate Ivanti server applications.

Maxime Thiebaut Forensics, Reverse Engineering 4 Comments March 1, 2024March 1, 2024 1 Minute

Generating IDA Type Information Libraries from Windows Type Libraries

In this quick-post, we'll explore how to convert Windows type libraries (TLB) into IDA type information libraries (TIL).

Maxime Thiebaut Tools, Reverse Engineering 1 Comment November 7, 2023November 6, 2023 5 Minutes

IcedID & Qakbot’s VNC Backdoors: Dark Cat, Anubis & Keyhole

IcedIDQakbot

In this post we introduce Dark Cat, Anubis and Keyhole, three IcedID & Kakbot VNC backdoor variants NVISO observed. We'll follow by exposing common TTPs before revealing information leaked through the attackers' clipboard data.

Maxime Thiebaut Videos, Forensics, Reverse Engineering 2 Comments March 20, 2023April 26, 2023 13 Minutes

Posts navigation

Older posts
NVISO Homepage
Jobs
Info and support
info@nviso.eu
Got hacked?
csirt@nviso.eu