ConCon Blog

Show left menu  
Hide left menu  
Java Obfuscation
Automating Removal of Java Obfuscation

By David Klein, 16 Feb. 2015

In this post we detail a method to improve analysis of Java code for a particular obfuscator, we document the process that was followed and demonstrate the results of automating ...

Evasive Measures: "faxmessage.php" malware delivery

By Deryl Slight and Matt Raeburn, 10 Dec. 2014

In the ongoing malware arms race attackers are always trying to find creative ways to bypass detection, and this isn’t something that is limited to targeted threat actors. In fact ...

RDP Replay Tool
RDP Replay

By Steve Elliott, 30 Oct. 2014

Here at Context we work hard to keep our clients safe. During routine client monitoring our analysts noticed some suspicious RDP traffic. It was suspicious for two reasons. Firstly the ...

Doom Printer
Hacking Canon Pixma Printers - Doomed Encryption

By Michael Jordon, 12 Sept. 2014

This blog post is another in the series demonstrating current insecurities in devices categorised as the ‘Internet of Things’. This instalment will reveal how the firmware on Canon Pixma printers ...

Rapid Response
Upcoming service announcement: IRIS, a new aperture on Incident Response

05 Sept. 2014

Rapid incident response is a core function of Context's Response division and we pride ourselves on the close relationships and integration we build with our clients. However, we have found ...

Exploit Sheet
Comma Separated Vulnerabilities

By James Kettle, 29 Aug. 2014

This post introduces Formula Injection, a technique for exploiting ‘Export to Spreadsheet’ functionality in web applications to attack users and steal spreadsheet contents. It also details a command injection exploit ...

A Cruel Interest blog image
A Cruel Interest: Attacker motivations for targeting the financial services sector

By Nick Mazitelli and Mark Graham, 05 Aug. 2014

A question we often get asked is “why would APTs target my organisation, what could a state sponsored attacker possibly want with us?” While the core areas of government and ...

Back to Top