Sextortion Scam Now With Malicious Downloader

Sextortion scams were a hit campaign last year and are continuing in 2019 with a new trick – the ...

Read More

Sextortion Scam Now With Malicious Downloader

Sextortion scams were a hit campaign last year and are continuing in 2019 with a new trick – the ...

Read More

Latest Flash 0-Day (CVE-2018-15982) Leaves its Office Doc Friend Behind

CVE-2018-15982 is the Flash 0day that was patched by Adobe at the beginning of December. At the ...

Read More

Using IPv6 to Bypass Security

Introduction

Read More

Living off the LAN

When an attacker uses tools native to the operating system it is referred to as Living off the ...

Read More

Overview of Meltdown and Spectre

You have probably heard the news of new vulnerabilities that affect most major chipsets, including ...

Read More

Spam Masters of Extortion, Illusion and Evasion

In 2018 we saw a rise in sextortion scams in which cyber-criminals notified their victims via email ...

Read More

Patch Tuesday, January 2019

Historically January has been a relatively light month for Patch Tuesday, but those days may be ...

Read More

Spam Masters of Extortion, Illusion and Evasion

In 2018 we saw a rise in sextortion scams in which cyber-criminals notified their victims via email ...

Read More

Kernel Buffer Overflow in Trusteer Rapport for MacOS

Trustwave recently reported a Kernel based vulnerability in a driver bundled along with IBM ...

Read More

Rise of the Webminers

About a year ago webminers began to appear on more and more websites. It was popularized by ...

Read More

Hacking Online Coupons

We all shop online. How many times, just before placing an online order, have you noticed the ...

Read More

Microsoft Patch Tuesday, December 2018

The last Patch Tuesday of 2018 is here and we are easing into the New Year with only 40 CVEs to ...

Read More

Magecart - An overview and defense mechanisms

Summary This blog post offers insight into Magecart and offers advice on how to protect your ...

Read More

Scavenger: Post-Exploitation Tool for Collecting Vital Data

‘Scavenger’ - definition [noun]: a person who searches for and collects discarded items.

Read More

Announcing ModSecurity version 2.9.3

We are happy to announce ModSecurity version 2.9.3!

Read More

Taking Advantage of AJAX for Account Enumeration

Context AJAX stands for Asynchronous JavaScript And XML. It’s a set of web development techniques ...

Read More

Sheepl : Automating People for Red and Blue Tradecraft

Whilst there is a wealth of information out there about how to build environments that can be used ...

Read More

Exploring and Modifying Android and Java Applications for Security Research

Sometimes pentesters and security researchers need to modify existing Java application but have no ...

Read More

Decoding Hancitor Malware with Suricata and Lua

Many types of malware send and receive data via HTTP. They may either be sending updates back to ...

Read More

ModSecurity v3.0.3: What To Expect

At precisely 155 commits ahead of the latest version, ModSecurity version 3.0.3 contains a number ...

Read More

Microsoft Patch Tuesday, November 2018

The second to last Patch Tuesday of 2018 is here with patches for 55 CVEs. This includes 11 rated ...

Read More

Demystifying Obfuscation Used in the Thanksgiving Spam Campaign

During Thanksgiving week, we noticed this quite unusual XML-format MS Office Document file:

Read More

Hacker's Wish Come True After Infecting Visitors of Make-A-Wish Website With Cryptojacking

After coming back from a vacation, the first thing to do is catch up with what happened while you ...

Read More

DOH! DNS Over HTTPS Poses Possible Risks to Enterprises

Introduction David Middlehurst of Trustwave SpiderLabs presented at the first ever conference ...

Read More

10 Years On – A Look Back at MS08-067

It has been ten years since the release of MS08-067. Unlike many of the other incidents over the ...

Read More

Underground Code of Honor – Part 1 of 3

"We are all honorable men here, we do not have to give each other assurances as if we were ...

Read More

Red Alert v2.0: Misadventures in Reversing Android Bot Malware

(Analysis by Rodel Mendrez and Lloyd Macrohon)

Read More