UNC Path Injection with Microsoft Access

Introduction Steve Borosh is a Principal Security Consultant for Trustwave and Trustwave Government ...

Read More

Patch Tuesday, June 2019

For June's Patch Tuesday, Microsoft is releasing four advisories and patches for a massive 88 CVEs, ...

Read More

Patch Tuesday, May 2019

May's Patch Tuesday is here and brings with it patches for 79 CVEs. Twenty-two of those CVEs are ...

Read More

Announcing the 2019 Trustwave Global Security Report

Today we released our 2019 Global Security Report. The report is based on the analysis of billions ...

Read More

Fake Power and Broadband Utility Bills serve Banking Trojans to Aussies

In our previous blog we highlighted how a group of scammers were targeting financial software ...

Read More

“Don’t Mine Me” – Coinhive

What's worse than annoying ads on a website? Crypto Miner on a website!

Read More

VAT Return with a Vengeance

Scam Overview Her Majesty's Revenue & Customs (HMRC) is the UK department responsible for ...

Read More

Locky Part 1: Lukitus Spam Campaigns and Their Love for Game of Thrones

Back in August 2017, Trustwave Spiderlabs reported a spam campaign that distributed a new Locky ...

Read More

Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest

EDIT (9.April.2019): We have applied for a retraction of CVE-2019-9193 previously associated with ...

Read More

Patch Tuesday, April 2019

Along with "Spring Showers" up here in the Northern Hemisphere, April also brings with it ...

Read More

Emotet lives another day using Fake O2 invoice notifications

We witnessed a widespread phishing campaign targeting O2 customers, that surfaced on 18th August, ...

Read More

Spammed PNG file hides LokiBot

Contributing authors: Phil Hay, Rodel Mendrez

Read More

Fake CIA Sextortion Scam Uses SatoshiBox

Another round of sextortion scam emails with a pdf attachment were pushed out recently claiming to ...

Read More

CVE-2018-19386: Reflected XSS in SolarWinds Database Performance Analyzer

Just a short post from me today, bringing you a pretty simple Cross-Site Scripting (XSS) issue. In ...

Read More

BEC Payroll Scam: Your Salary is Mine!

Con men have been exploiting human psychology since the dawn of time. Equipped with the ...

Read More

Patch Tuesday, March 2019

This month's Patch Tuesday brings with it four advisories and patches for 64 CVEs including a patch ...

Read More

QRCode Used in Extortion Spam Campaign

Sextortion is a form of sex-themed exploitation via email where victims are coerced to give money ...

Read More

Attacker Tracking Users Seeking Pakistani Passport

A few days ago we encountered a breach on a Pakistani government site which was compromised to ...

Read More

Detecting Malicious Behavior by Unmasking WebSockets

WebSockets allow a single TCP connection to have full duplexing communications. This type of ...

Read More

Sheepl 2.0: Automating People for Red and Blue Tradecraft

When I first released Sheepl 0.1 in September 2018 as part of a talk, I wanted to showcase a ...

Read More

Bangladesh Embassy Website in Cairo Compromised

In the world of Phishing emails, we often see schemes which involve enticing users to open a ...

Read More

Digging Deep Into Magecart Malware

Last week, one of my SpiderLabs colleagues was working on a PCI forensic triage for a website. ...

Read More

Malware Xeroing in on Cloud Accounting Customers

We witnessed a sophisticated phishing campaign on 16th August 2017, targeting victims by sending ...

Read More

Stealing Money by Asking for It: Business Email Compromise via Altered Invoices

We are seeing more reports from organizations being targeted by what could be called an 'altered ...

Read More

Password Protected Word Document Delivers HERMES Ransomware

Evading AV detection is part of a malware author's routine in crafting spam campaigns and an old ...

Read More

Patch Tuesday, February 2019

With today's Patch Tuesday for February, things are back to normal with patches for 76 CVEs and ...

Read More

Money Laundering: Washing Your Greens in the Underground - Part 3 of 3

“Not having to worry about money is almost like not having to worry about dying.” - Mario Puzo

Read More

Lifesize Team, Room, Passport & Networker Remote OS Command Injection

While working on various vulnerability research projects, I encountered multiple Authenticated ...

Read More