{"id":15818,"date":"2016-01-10T01:41:43","date_gmt":"2016-01-10T07:41:43","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=15818"},"modified":"2016-01-10T01:41:43","modified_gmt":"2016-01-10T07:41:43","slug":"antivirus-software-could-make-your-company-more-vulnerable","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=15818","title":{"rendered":"Antivirus software could make your company more vulnerable"},"content":{"rendered":"<blockquote><p>While these are mainly examples of using antivirus vulnerabilities to evade detection, there&#8217;s also a demand for remote code execution exploits affecting antivirus products and these are being sold by specialized brokers on the largely unregulated exploit market.<\/p>\n<p>Among the emails leaked last year from Italian surveillance firm Hacking Team there is <a href=\"https:\/\/wikileaks.org\/hackingteam\/emails\/emailid\/71862\">a document with exploits offered for sale<\/a> by an outfit called Vulnerabilities Brokerage International. The document lists various privilege escalation, information disclosure and detection bypassing exploits for multiple antivirus products, and also a remote code execution exploit for ESET NOD32 Antivirus with the status &#8220;sold.&#8221;<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/www.csoonline.com\/article\/3020459\/security\/antivirus-software-could-make-your-company-more-vulnerable.html\">Antivirus software could make your company more vulnerable<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While these are mainly examples of using antivirus vulnerabilities to evade detection, there&#8217;s also a demand for remote code execution exploits affecting antivirus products and these are being sold by specialized brokers on the largely unregulated exploit market. Among the &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=15818\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[1033,1125,698],"class_list":["post-15818","post","type-post","status-publish","format-standard","hentry","category-pc-issues","tag-anti-virus","tag-exploit-vector","tag-security-research"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15818"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15818\/revisions"}],"predecessor-version":[{"id":15819,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15818\/revisions\/15819"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15818"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}