{"id":15850,"date":"2021-06-28T01:00:00","date_gmt":"2021-06-28T01:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/06\/28\/two-sangfor-studies-selected-for-presentation-at-black-hat-usa-2021\/"},"modified":"2021-06-28T01:00:00","modified_gmt":"2021-06-28T01:00:00","slug":"two-sangfor-studies-selected-for-presentation-at-black-hat-usa-2021","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/06\/28\/two-sangfor-studies-selected-for-presentation-at-black-hat-usa-2021\/","title":{"rendered":"Two Sangfor Studies Selected for Presentation at Black Hat USA 2021"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p>HONG&#13;<br \/>\nKONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211; 28 June 2021 &#8211;\u00a0Black Hat USA&#13;<br \/>\n2021 kicks off on July 31<sup>st<\/sup>, bringing together the world&#8217;s most&#13;<br \/>\ncutting-edge security researchers for a week of security demonstrations and&#13;<br \/>\ninformation sharing. Competition to present is fierce, with only the most&#13;<br \/>\nunique research highlighted. <a href=\"https:\/\/www.sangfor.com\/\">Sangfor<\/a> Security Team is proud to be presenting two&#13;<br \/>\nstudies to the world&#8217;s top security experts and researchers.<\/p>\n<p><a href=\"https:\/\/www.blackhat.com\/us-21\/\">Black Hat USA<\/a>\u00a0is&#13;<br \/>\nthe largest and most authoritative source for security trends. Two Sangfor studies were selected from thousands submitted for presentation: <i>&#8220;<\/i> <a href=\"https:\/\/www.blackhat.com\/us-21\/briefings\/schedule\/index.html#diving-in-to-spooler-discovering-lpe-and-rce-vulnerabilities-in-windows-printer-23315\"><i>Diving&#13;<br \/>\nInto Spooler: Discovering LPE and RCE Vulnerabilities in Windows Printer<\/i><\/a><i>&#8221; and &#8220;<\/i><a href=\"https:\/\/www.blackhat.com\/us-21\/briefings\/schedule\/index.html#exploiting-windows-comwinrt-services-23653\"><i>Exploiting&#13;<br \/>\nWindows COM\/WinRT Services<\/i><\/a><i>&#8221; <\/i>with Sangfor researchers Zhiniang Peng, Xuefeng Li and Lewis Lee presenting.\u00a0 These presentations&#13;<br \/>\nshowcase previously unknown or zero-day privilege escalation (LPE) and remote&#13;<br \/>\nexecution (RCE) vulnerabilities. Hackers exploit LPE and RCE vulnerabilities to&#13;<br \/>\ngain administrative access for stealing data, installing ransomware, or to&#13;<br \/>\nattack other systems. \u00a0Zero-day&#13;<br \/>\nvulnerabilities greatly increases risk from LPE and RCE vulnerabilities because&#13;<br \/>\nyou cannot protect against what you do not know.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Multiple 0-Day&#13;<br \/>\nVulnerabilities Found in Spooler<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Ten years ago, the Stuxnet worm used a Windows Printer Spooler privilege&#13;<br \/>\nupgrade vulnerability to destroy Iran&#8217;s nuclear enrichment centrifuges, and&#13;<br \/>\ninfect more than 45,000 networks, crippling Iran&#8217;s nuclear facilities. \u00a0Sangfor researchers discovered multiple, new 0-day&#13;<br \/>\nvulnerabilities within Spooler, all detailed in their upcoming presentation at&#13;<br \/>\nthe Black Hat conference.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Sangfor Discovers Hundreds of&#13;<br \/>\nWindows COM\/WinRT Vulnerabilities<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Windows&#13;<br \/>\nCOM\/WinRT components are a basic part of Windows 10 Universal Windows Platform&#13;<br \/>\n(UWP) applications, widely used for cross-process communication. Security&#13;<br \/>\nvulnerabilities in these components means Windows systems would be exposed to many&#13;<br \/>\ndifferent types of attack. Sangfor researchers discovered more than 100&#13;<br \/>\nvulnerabilities in Windows COM\/WinRT services.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Sangfor&#13;<br \/>\nBlueOps Team<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Experienced security teams&#13;<br \/>\nare the most coveted in cyber security now, keeping up with the constant flow&#13;<br \/>\nof new cyber threat and ensuring enterprises have the tools they need to&#13;<br \/>\nrespond effectively. Sangfor BlueOps, Sangfor&#8217;s highly skilled defensive security&#13;<br \/>\ntest or blue team, works to improve attack detection and defence of Sangfor&#8217;s security&#13;<br \/>\nsolutions. They hunt threats daily to identify dangers from hacking groups and their&#13;<br \/>\nsoftware then develop effective response methods against them. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-06-28\/83343\/two-sangfor-studies-selected-for-presentation-at-black-hat-usa-2021\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG&#13; KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211; 28 June 2021 &#8211;\u00a0Black Hat USA&#13; 2021 kicks off on July 31st, bringing together the world&#8217;s most&#13; cutting-edge security researchers for a week of security demonstrations and&#13; information sharing. Competition to present is fierce, with only the most&#13; unique research highlighted. Sangfor Security Team is proud to be presenting two&#13; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15850"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=15850"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15850\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=15850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=15850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=15850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}