Advertisement Β· 728 Γ— 90

Posts by Synacktiv

Preview
Remote Code Execution from any domain account in BizTalk360 Remote Code Execution from any domain account in BizTalk360

Our ninjas identified vulnerabilities in the #BizTalk360 solution. They can be exploited from any authenticated domain user, and lead to full server compromise.

A new version is available, update your instances!

πŸ‘‡

2 days ago 2 0 0 0
Post image

Based on the incidents we handled, our observations align with #ANSSI 's 2025 Cyber Threat Landscape:
πŸ”» Fewer ransomware attacks
πŸ”Ί More data exfiltrations

πŸ’‘ Discover the top 3 causes of data breaches in our infographic!

Facing a breach? Contact us: πŸ“© csirt@synacktiv.com

2 weeks ago 2 1 1 0
Preview
Kubernetes forensics 1/3 : what the container ? Synacktiv - IT Security expertise - Penetration tests, Security audits, Code review, Training, Consulting, Vulnerability research

Attacks targeting #Kubernetes are surging in 2025 πŸ”Ž

To tackle this, Synacktiv #CSIRT is launching a series of articles on Kubernetes forensics.

First up: understanding the underlying container technology πŸ‘‡
www.synacktiv.com/en/node/1320

2 weeks ago 0 0 0 0
Preview
Exploring cross-domain & cross-forest RBCD Exploring cross-domain & cross-forest RBCD

If #RBCD has been thoroughly documented, only a few resources mention the workflow in cross-domain environment.
In our new blogpost, we dive into the cross-domain and cross-forest RBCD workflows

Read it here πŸ‘‡
www.synacktiv.com/en/publicati...

2 weeks ago 0 0 0 0
Preview
Deep-dive into the deployment of an on-premise low-privileged LLM Deep-dive into the deployment of an on-premise low-privileged LLM

Deep dive into the provisionning an on-prem low-privileged #LLM stack, with air-gapped networking and GPU-isolation, hardened down to kernel modules.

What could possibly go wrong?

Read the full article here: www.synacktiv.com/en/publicati...

3 weeks ago 1 2 0 1
Video

πŸ’‘ Raising awareness to improve investigations

User testimonies are invaluable during incidents - but healthy doubt matters too πŸ”
Trust & accountability help organisations better understand and resolve #cyber incidents.

πŸ“Š Discover our recommendations ↓
πŸ“© www.synacktiv.com/en/offers/tr...

3 weeks ago 1 0 0 0
Video

Active #RDP connections can reveal the client hostname πŸ”Ž
A key indicator for investigations & #CTI: some attackers reuse hostnames.
Traces to check: CLIENTNAME env variable & RDP printer redirection.

πŸ›‘οΈ Incident? Contact #Synacktiv CSIRT 24/7: csirt@synacktiv.com

1 month ago 2 1 0 0
Advertisement
Preview
mitmproxy for fun and profit: Interception and Analysis of Application mitmproxy for fun and profit: Interception and Analysis of Application

πŸ”Ž Want to know what you can really do with #mitmproxy?

This deep dive shows how to intercept and modify application traffic on #Linux, #Android, and #iOS - from TLS MITM to gRPC/Protobuf tampering.

Read our latest article: www.synacktiv.com/en/publicati...

1 month ago 3 2 0 0

πŸš€ Last December, the Synacktiv #WinterChallenge 2025 took place.
πŸ‘ Congratulations to the 25 participants for their outstanding solutions!
🧠 Read the write-up on the best techniques used to craft a constraint-compliant quinindrome: www.synacktiv.com/en/publicati...

1 month ago 2 1 0 0
Video

#IT evolves… and so do attacks. πŸ›‘οΈ

Sharpen your skills in March-April 2026 with our #cybersecurity courses: Forensic, Cloud, Active Directory & Malware Analysis.

πŸ“… Limited spots: www.synacktiv.com/en/offers/tr...

2 months ago 1 2 0 0
Preview
Beyond ACLs: Mapping Windows Privilege Escalation Paths with Beyond ACLs: Mapping Windows Privilege Escalation Paths with

In our latest article, @niozow.bsky.social dives into the inner workings of #Windows access tokens, privileges and logon rights.
As these rights often constitute a blind spot for AD enumeration tools, the article describes our PRs to integrate them into BloodHound ⬇️
www.synacktiv.com/en/publicati...

2 months ago 1 3 0 0
Video

πŸ” Synacktiv training courses - April 2026

Hands-on #cybersecurity courses led by #Synacktiv experts: Cloud Forensics (AWS), Azure & AD intrusion tactics.
πŸ“… March-April | Onsite & Remote
πŸ‘‰ www.synacktiv.com/en/offers/tr...

2 months ago 0 0 0 0
Preview
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025 On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025

At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller.
Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit.

πŸ” www.synacktiv.com/en/publicati...

2 months ago 6 1 0 0
Post image Post image

On the podium at #Pwn2Own Automotive 2026 πŸ₯‰

Synacktiv ranked 3rd in Tokyo πŸ‡―πŸ‡΅ after successful attacks on #Tesla Infotainment (USB), #Sony XAV-9500ES (USB) and #Autel MaxiCharger (NFC).

πŸ“ Next stop: Berlin!

2 months ago 5 4 0 0
Post image

Proud to announce that REVELΒ·IO has secured funding from @bpifrance-officiel.bsky.social under #France2030 πŸš€

With @synacktiv.com, this supports a new version to:
➑️ help CERT teams automate live forensic analysis
➑️ enable French & European judicial experts to perform reliable mobile extractions

2 months ago 1 1 0 0
Video

Our experts will be at #Pwn2Own Automotive in Tokyo πŸ‡―πŸ‡΅

After taking 1st place in 2024 by uncovering #Tesla and automotive vulnerabilities, they’re back to explore new attack entry points!

Stay tuned πŸ”

2 months ago 1 1 0 0
Video

Cyber threats evolve fast - so should your skills.
In March, join our hands-on #cybersecurity training covering Linux Forensics, Cloud Forensics (Azure & AWS) and Intrusion Tactics.

βŒ› Limited seats β†’ www.synacktiv.com/en/offers/tr...

#Cybersecurity #Forensics #CloudSecurity

2 months ago 0 0 0 0
Advertisement
Preview
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025 Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025

From legacy WEP to WPA3-Enterprise: sharing our recent #WiFi field experiences. πŸ“‘

We detail various scenarios to better understand the risks, including WPA3 PEAP relaying & optimized online PSK brute-forcing.

‡️ www.synacktiv.com/en/publicati...

2 months ago 3 2 0 0
Video

πŸ”’ Feb 2026: #cybersecurity training with #Synacktiv!

5&6 Feb: Kubernetes Intrusion Tactics (Paris, FR)
9&10 Feb: AWS Intrusion Tactics (Paris, FR)
9-11 Feb: Malware Analysis (Remote, EN)
16-20 Feb: Attacking Web Apps (Paris, FR)

βœ… Register now: www.synacktiv.com/en/offers/tr...

3 months ago 0 0 0 0
Preview
Livewire: remote command execution through unmarshaling Livewire: remote command execution through unmarshaling

🚨 Pre-Auth RCE in #Livewire (CVE-2025-54068)!

Our specialists uncovered a critical flaw allowing remote code execution without the APP_KEY, exploiting Livewire’s hydration mechanism + PHP’s loose typing.

πŸ”— Patch now! (v3.6.4+)
www.synacktiv.com/en/publicati...

3 months ago 1 0 0 0
Post image

πŸš€ [Training 2026] Research & exploitation: embedded #Linux systems

5-day training on UART access, firmware analysis, QEMU emulation, fuzzing (AFL++), static analysis & persistence on compromised systems.

πŸ“ On site, Paris
πŸ‡«πŸ‡· French

Register πŸ‘‡
www.synacktiv.com/en/offers/tr...

3 months ago 1 0 0 0
Video

πŸ”₯ Synacktiv’s #CSIRT 2026 training sessions are coming!

Forensics, malware analysis, cloud investigations - all taught by our experts, available remotely or on site, in French or English.

Register πŸ‘‡
www.synacktiv.com/en/offers/tr...

3 months ago 1 0 0 0
Preview
Exploiting Anno 1404 Exploiting Anno 1404

[New blog post] As part of an R&D project, @tomtombinary.bsky.social identified several critical vulnerabilities in the LAN multiplayer mode of the game Anno 1404 (released in 2009) πŸ”

Want to know more?
Read the full article on our blog πŸ‘‡
www.synacktiv.com/en/publicati...

3 months ago 3 3 0 0
Preview
ActivID administrator account takeover : the story behind ActivID administrator account takeover : the story behind

HID recently disclosed HID-PSA-2025-002, a critical flaw in the #ActivID Authentication Appliance 8.7.

In our new blog post, @us3r777.bsky.social and @pierregg.bsky.social break down exactly how they uncovered it, from methodology to exploitation πŸ’‘

Read it here ⬇️
synacktiv.com/en/publicati...

3 months ago 3 2 0 0

πŸ”₯ #Synacktiv’s 2026 Internship Book is out!

Whether you're into pentest, reverse engineering, incident response or development, you’ll find our full list of internships plus practical tips to boost your chances.

πŸ“¬ Send us your CV: www.synacktiv.com/book_stage_s...

3 months ago 0 0 0 0
Advertisement
Preview
Trainings Synacktiv

Level up your #pentest skills in 2026 πŸš€

Join Synacktiv’s hands-on trainings: from Kubernetes & cloud hacks to web app attacks & AD intrusion.

More information & registration : www.synacktiv.com/en/offers/tr...

#cybersecurity

3 months ago 0 1 0 0
Video

πŸ•΅οΈβ€β™‚οΈ When an 'innocent' #PHP file hides a #backdoor…
During an investigation on a compromised server, we came across an obfuscated PHAR stub - a classic sign of a #webshell trying to evade basic scanners.

Check out our technical analysis πŸ”
Have you ever encountered this type of β€œpackaged” webshell? πŸ’¬

4 months ago 1 1 0 0

πŸŽ“πŸš€ Ready to level up your #cybersecurity skills?

Synacktiv’s 2026 training programs are open for registration!
Get practical, expert-led sessions in offensive and defensive cybersecurity - online or in-person, in French or English πŸ‡«πŸ‡·πŸ‡¬πŸ‡§

πŸ”— Learn more: www.synacktiv.com/en/offers/tr...

4 months ago 0 0 0 0
Video

Winter is here, it's time to test your assembly skills with the #Synacktiv Winter Challenge πŸ‚.
A code golf competition that guarantees hours of intense x86 instruction optimization!

πŸ”— Participate here: www.synacktiv.com/en/publicati...

4 months ago 3 1 0 1