c
Aug. 4, 2023, 1:52 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by Uptycs. Threat Researchers: Nischay Hegde and Siddartha Malladi. A deceptive twist has appeared within cybersecurity norms—a proof of concept (PoC) that, rather than demonstrating a vulnerability, stealthily harbors a hidden backdoor. Recently discovered by the Uptycs threat research team, our finding particularly impacts the security research community.As their primary users, security researchers rely on PoCs to understand potential vulnerabilities by way of innocuous...

backdoor community concept cybersecurity exploit fake hidden malware poc poc exploit proof research researchers security security research team threat threat research uptycs vulnerability

More from cloudsecurityalliance.org / Cloud Security Alliance

C003561 On-line Vulnerability Assessment (OVA) Tool Manager (CTS) - WED 22 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Engineer - IT Security Compliance

@ Tiffany & Co. | Parsippany, NJ, United States

Senior Restricted Research Compliance Specialist

@ University of Cincinnati | Cincinnati, OH, US

Senior Manager of Security Engineering - Employee Compute

@ JPMorgan Chase & Co. | Houston, TX, United States

Incident Response Analyst

@ Verisk | Jersey City, NJ, United States

Application Security Penetration Tester

@ Vodeno | Poland (remote)