PhishINvite with Malicious ICS Files
In an earlier blog entitled “Phishing in the Cloud”, we outlined that threat actors are actively ...
Read MoreIn an earlier blog entitled “Phishing in the Cloud”, we outlined that threat actors are actively ...
Read MoreIntro Before this pandemic, Neil Burrows and myself (Bruno Oliveira) from Trustwave's SpiderLabs ...
Read MoreOn June 25, 2020 Trustwave SpiderLabs published research showing that the Intelligent Tax software, ...
Read MoreTrustwave SpiderLabs has discovered a new malware family, dubbed GoldenSpy, embedded in tax payment ...
Read MoreIn this blog, we take an in-depth technical look at Pillowmint malware samples received from our ...
Read MoreSummary Australian Prime Minister Australian Prime Minister Scott Morrison announced today that ...
Read MoreOverview Due to the global pandemic of COVID-19, there’s been an explosion of video conferencing ...
Read MoreCybercriminals are continuously exploiting the Coronavirus (COVID-19) pandemic. In our quest to ...
Read MoreJune's Patch Tuesday has crept upon us and while our minds may be elsewhere, the need to keep our ...
Read MoreAs a mobile app tester, I have encountered numerous varied vulnerabilities. During one of my mobile ...
Read MoreFor the last several years there have been relatively few security patches for SAP Adaptive Server ...
Read MoreAn Uptick in Activity Over the last week we've seen the compromise of a number of supercomputers ...
Read MoreCredential phishing is a real threat that's targeting organizations globally. Threat actors are ...
Read MoreOur attempts to investigate the underground and document some of what’s going on in the Dark Web ...
Read MoreIn this blog, I will be covering how to use Azure App Services for offensive purposes. What is ...
Read MoreMay's Patch Tuesday includes patches for 111 unique CVEs. Of those CVEs 17 are rated "Critical" and ...
Read MoreHere at SpiderLabs, we take the security of all our clients extremely seriously. While the attacks ...
Read MoreIntroduction SCADA/OT security has been a growing concern for quite some time. This technology ...
Read MoreHaving a well designed and tested social engineering training program for an organization is an ...
Read MoreEarly March of this year, we blogged about multiple malspam campaigns utilizing Excel 4.0 Macros in ...
Read MoreBusiness email compromise (BEC) also known as CEO fraud has undoubtedly become the biggest Internet ...
Read MoreApril's Patch Tuesday is here and Microsoft is patching 113 CVEs this month. Eighteen of these are ...
Read MoreOverview In Part One of this series, we discussed how MailTo ransomware installs and configures ...
Read MoreOverview In Part One of this series, we discussed how MailTo ransomware installs itself on the ...
Read MoreIntroduction Hi everyone, how are you? I know the times are strange but we should fight together, ...
Read MoreIn February, an Australian transportation company called Toll Group was hit by a ransomware attack ...
Read MoreBack in February, we reported on two Coronavirus-themed phishing emails. But just as the real virus ...
Read More