Monster Lurking in Hidden Excel Worksheet
A recent blog by Didier Steven’s showed how malicious Excel 4 macros can be stored in OOXML (Office ...
Read MoreA recent blog by Didier Steven’s showed how malicious Excel 4 macros can be stored in OOXML (Office ...
Read MoreIntroduction Hello again! We are back with more Windows internals and it's time to get real. We ...
Read MoreThe Remote Access Tool (RAT) is one of the malware types we often encounter with our Security Email ...
Read MoreCredential phishing is one of the leading threats faced by organizations today. Threat actors use ...
Read MoreIt’s out there in the newspaper, social media, and television headlines. The Coronavirus (aka ...
Read MoreFebruary's Patch Tuesday is here and brings with it patches for 98 CVEs. These are split between 13 ...
Read MorePicture the scene - you’re on a penetration test, somehow you’ve got hold of a bunch of .NET ...
Read More2020 is not starting out quietly for Microsoft, it seems. After the first Patch Tuesday of 2020 ...
Read MoreModSecurity is an open-source WAF engine maintained by Trustwave. As a lively open-source project, ...
Read MoreOne of the most notable vulnerabilities patched during Microsoft's first Patch Tuesday of 2020 was ...
Read MoreThe Citrix vulnerability (CVE-2019-19781) was first identified in December of 2019. This ...
Read MoreHappy 2020! Microsoft is helping you celebrate the new decade with patches for 49 CVEs. Of those ...
Read MoreIt is a pleasure to announce the release of ModSecurity version 3.0.4 (libModSecurity). This ...
Read MoreIntroduction Hi, my fellow friends! How are you? Hopefully, you had a terrific holiday and much ...
Read MoreIntroduction In this blog post, I intend to provide some insight into using the InterPlanetary File ...
Read MoreThis year we observed a notable uptick in disc imaging software (like .ISO) being used as a ...
Read MoreIn the past, there have been plenty of articles and blog posts recommending the use of Content ...
Read MorePython's popularity is amazing and constantly growing. For the first time, Python has overtaken ...
Read MoreDecember's Patch Tuesday is upon us, and, as in years gone by, it's a rather light month. All told ...
Read MoreDuring red team engagements, lateral movement in a network is crucial. In addition, as a critical ...
Read MoreNovember’s Patch Tuesday from Microsoft included a patch for yet another Internet Explorer 0-day, ...
Read MoreToday we are releasing CrackQ, a queuing system to manage password cracking that I've been working ...
Read MoreOften when penetration tests are scheduled, it will be requested that testing occurs during ...
Read MoreBack in May of this year, I discovered a few vulnerabilities in the SatLink 2000 VSAT modem, which ...
Read MoreRecently, fake Microsoft Windows Update emails were spammed with the following subject lines: ...
Read MoreIntroduction Hello again! After our previous post about the environment setup, now it is time to ...
Read MoreIn the past, we’ve described how to fingerprint Ubuntu OS Version using OpenSSH. This time, I’ll ...
Read More