AmberWolf Research
  • Home
  • Blog
  • Disclosure Policy
  • Main Site
to navigate to select ESC to close
  • Gavin Holt Gavin Holt
  • 09 Aug, 2025
    • Vulnerability
    • NachoVPN
    • ZTNA
    • DEFCON

Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview

Uncovering critical flaws in ZTNA solutions, allowing attackers to escalate privileges on end user devices and to completely bypass authentication, …

Read Article
  • Iain Smart Iain Smart
  • 01 Sep, 2025
    • Kubernetes

Breaking Boundaries - Kubernetes Namespaces and multi-tenancy

Footguns and privilege escalations making multi-tenancy difficult in Kubernetes clusters.

Read Article
  • Richard Warren Richard Warren
  • David Cash David Cash
  • 29 Aug, 2025
    • Vulnerability
    • ZTNA
    • DEFCON
    • Netskope

Advisory - Netskope Client for Windows - Local Privilege Escalation via Rogue Server (CVE-2025-0309)

Always Trust, Never Verify - except when you have to trust the server isn’t malicious .. and install this CA certificate and MSI while …

Read Article
  • David Cash David Cash
  • 20 Aug, 2025
    • PAM
    • Vulnerability
    • Disclosure
    • Delinea

Delinea Protocol Handler - MSI Strikes Back

Introduction Delinea’s custom URL handler allows the software’s update process to be triggered, downloading and running an MSI from an …

Read Article
  • Richard Warren Richard Warren
  • David Cash David Cash
  • 15 Aug, 2025
    • Vulnerability
    • ZTNA
    • DEFCON
    • Netskope

Advisory - Netskope Cross-tenant Authentication Bypass

Advisory - Netskope Cross-tenant Authentication Bypass

Read Article
  • Richard Warren Richard Warren
  • David Cash David Cash
  • 09 Aug, 2025
    • Vulnerability
    • Zscaler
    • ZTNA
    • DEFCON

Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982)

Advisory - Zscaler SAML Authentication Bypass (CVE-2025-549820)

Read Article
  • 1
  • 2
  • 3
  • 4
  • Main Site
  • Privacy

Copyright AmberWolf 2024