Patch Tuesday, March 2019

This month's Patch Tuesday brings with it four advisories and patches for 64 CVEs including a patch ...

Read More

QRCode Used in Extortion Spam Campaign

Sextortion is a form of sex-themed exploitation via email where victims are coerced to give money ...

Read More

Attacker Tracking Users Seeking Pakistani Passport

A few days ago we encountered a breach on a Pakistani government site which was compromised to ...

Read More

Detecting Malicious Behavior by Unmasking WebSockets

WebSockets allow a single TCP connection to have full duplexing communications. This type of ...

Read More

Sheepl 2.0: Automating People for Red and Blue Tradecraft

When I first released Sheepl 0.1 in September 2018 as part of a talk, I wanted to showcase a ...

Read More

Bangladesh Embassy Website in Cairo Compromised

In the world of Phishing emails, we often see schemes which involve enticing users to open a ...

Read More

Digging Deep Into Magecart Malware

Last week, one of my SpiderLabs colleagues was working on a PCI forensic triage for a website. ...

Read More

Malware Xeroing in on Cloud Accounting Customers

We witnessed a sophisticated phishing campaign on 16th August 2017, targeting victims by sending ...

Read More

Stealing Money by Asking for It: Business Email Compromise via Altered Invoices

We are seeing more reports from organizations being targeted by what could be called an 'altered ...

Read More

Password Protected Word Document Delivers HERMES Ransomware

Evading AV detection is part of a malware author's routine in crafting spam campaigns and an old ...

Read More

Patch Tuesday, February 2019

With today's Patch Tuesday for February, things are back to normal with patches for 76 CVEs and ...

Read More

Money Laundering: Washing Your Greens in the Underground - Part 3 of 3

“Not having to worry about money is almost like not having to worry about dying.” - Mario Puzo

Read More

Lifesize Team, Room, Passport & Networker Remote OS Command Injection

While working on various vulnerability research projects, I encountered multiple Authenticated ...

Read More

Sextortion Scam Now With Malicious Downloader

Sextortion scams were a hit campaign last year and are continuing in 2019 with a new trick – the ...

Read More

Sextortion Scam Now With Malicious Downloader

Sextortion scams were a hit campaign last year and are continuing in 2019 with a new trick – the ...

Read More

Latest Flash 0-Day (CVE-2018-15982) Leaves its Office Doc Friend Behind

CVE-2018-15982 is the Flash 0day that was patched by Adobe at the beginning of December. At the ...

Read More

Using IPv6 to Bypass Security

Introduction

Read More

Living off the LAN

When an attacker uses tools native to the operating system it is referred to as Living off the ...

Read More

Overview of Meltdown and Spectre

You have probably heard the news of new vulnerabilities that affect most major chipsets, including ...

Read More

Spam Masters of Extortion, Illusion and Evasion

In 2018 we saw a rise in sextortion scams in which cyber-criminals notified their victims via email ...

Read More

Patch Tuesday, January 2019

Historically January has been a relatively light month for Patch Tuesday, but those days may be ...

Read More

Spam Masters of Extortion, Illusion and Evasion

In 2018 we saw a rise in sextortion scams in which cyber-criminals notified their victims via email ...

Read More

Kernel Buffer Overflow in Trusteer Rapport for MacOS

Trustwave recently reported a Kernel based vulnerability in a driver bundled along with IBM ...

Read More

Rise of the Webminers

About a year ago webminers began to appear on more and more websites. It was popularized by ...

Read More

Hacking Online Coupons

We all shop online. How many times, just before placing an online order, have you noticed the ...

Read More

Microsoft Patch Tuesday, December 2018

The last Patch Tuesday of 2018 is here and we are easing into the New Year with only 40 CVEs to ...

Read More

Magecart - An overview and defense mechanisms

Summary This blog post offers insight into Magecart and offers advice on how to protect your ...

Read More

Scavenger: Post-Exploitation Tool for Collecting Vital Data

‘Scavenger’ - definition [noun]: a person who searches for and collects discarded items.

Read More