Evasive URLs in Spam: Part 2
A URL can be completely valid, yet still misleading. In this blog, we will present another ...
Read MoreA URL can be completely valid, yet still misleading. In this blog, we will present another ...
Read MoreZeroLogon has quickly become popular and well known because of multiple proofs of concept and ...
Read MoreIntroduction Today I'd like to discuss two information disclosure vulnerabilities that occur in SAP ...
Read MoreOn September 14th, researchers at security firm Secura published a white paper detailing a complete ...
Read MoreThis post is part one of a two part series. You can read part two here.
Read MoreA few days ago a new version of THE most common exploit kit was released. Unlike most exploit kit ...
Read MoreModSecurity is an open-source Web Application Firewall (WAF) engine maintained by Trustwave. The ...
Read MoreThe Qua or Quaverse Remote Access Trojan (QRAT) is a Java-based RAT that can be used to gain ...
Read MoreI’ve recently blogged about a shared memory vulnerability in Cisco WebEx Meetings Client on Windows ...
Read MoreOverview I think every penetration tester has a story about the one that got away. The bug that ...
Read MoreLast week, security researcher Amir Etemadieh (aka Zenoflex) disclosed that vBulletin’s patch for ...
Read MoreAugust's Patch Tuesday is here with 120 CVEs patched. That includes 100 rated as "Important" and 20 ...
Read MoreA good way to keep an eye on attackers and get insight on their techniques and tactics is to use a ...
Read MoreIntroduction During this global pandemic COVID-19 situation, there has been an increasing trend of ...
Read MoreIn a previous post we explored the importance of scanning hostnames instead of IP addresses in ...
Read MoreRecently ASUS patched two issues I discovered in the RT-AC1900P router firmware update ...
Read MoreEmail scammers always seem to invent new ways of trickery to gain cash from their victims. We ...
Read MoreJuly's Patch Tuesday is here with another large list of CVEs. It includes 20 CVEs rated "Critical" ...
Read MoreAt the beginning of June 2020, we were contacted about a breach of a website using the Magento ...
Read MoreDuring April, amid the Covid-19 pandemic, Perception-Point wrote about a phishing campaign that ...
Read MoreThe traditional approach to a vulnerability scan or penetration test is to find the IP addresses ...
Read MoreBackground: On June 25th, Trustwave SpiderLabs published our research on a backdoor, dubbed ...
Read MoreIn an earlier blog entitled “Phishing in the Cloud”, we outlined that threat actors are actively ...
Read MoreIntro Before this pandemic, Neil Burrows and myself (Bruno Oliveira) from Trustwave's SpiderLabs ...
Read MoreOn June 25, 2020 Trustwave SpiderLabs published research showing that the Intelligent Tax software, ...
Read MoreTrustwave SpiderLabs has discovered a new malware family, dubbed GoldenSpy, embedded in tax payment ...
Read MoreIn this blog, we take an in-depth technical look at Pillowmint malware samples received from our ...
Read More