Malspam Campaign Targets Banks Using Microsoft Publisher

It's very unusual for malware authors to utilize publishing software like Microsoft Publisher which ...

Read More

Patch Tuesday, August 2018

Patch Tuesday, August 2018

Read More

Mapping Social Media with Facial Recognition: A New Tool for Penetration Testers and Red Teamers

Performing intelligence gathering is a time-consuming process, it typically starts by attempting to ...

Read More

CVE-2018-2892 - Kernel Level Privilege Escalation in Oracle Solaris

Trustwave recently discovered a locally exploitable issue in all current versions of Oracle Solaris ...

Read More

Malicious SettingContent now Delivered Through PDF

Recently, a proof-of-conceptemerged on how the filetype SettingContent can be abused when getting ...

Read More

DanaBot Riding Fake MYOB Invoice Emails

Authors: Dr. Fahim Abbasi and Diana Lopera

Read More

Patch Tuesday, July 2018

July's Patch Tuesday is here with patches for 53 CVEs and the standard roll up of patches for ...

Read More

Web Application Security-ModSecurity Commercial Rules, Update for June 2018

Overview for rules released by Trustwave SpiderLabs in November for ModSecurity Commercial Rules ...

Read More

Adobe Flash Player 0-Day (CVE-2018-5002)

An Adobe advisory regarding a zero-day vulnerability in Adobe Flash Player was published late last ...

Read More

Patch Tuesday, June 2018

For June's Patch Tuesday Microsoft is patching 50 CVEs and releasing 2 advisories. Adobe Flash is ...

Read More

Breakdown of the EFAIL Email Vulnerabilities

hullabaloo [huhl-uh-buh-loo], noun, plural hullabaloos.

Read More

CVE-2018-8174 and Forcing Internet Explorer Exploits

A zero day exploit was discovered targeting trade agencies and other related organizations in China ...

Read More

CVE-2018-1000136 - Electron nodeIntegration Bypass

A few weeks ago, I came across a vulnerability that affected all current versions of Electron at ...

Read More

Patch Tuesday, May 2018

May's Patch Tuesday is here and it looks like these monthly releases have plateaued at around 70 ...

Read More

'Drupalgeddon2' Recent Developments

Drupal, the popular Content Management System, (might) have seen better days. There's been a lot of ...

Read More

All Your Base64 Are Belong To Us – Dynamic vs. Static Analysis of Web Content

I recently encountered an interesting phishing scheme when reviewing telemetry of incidents blocked ...

Read More

Patch Tuesday, April 2018

April's Patch Tuesday didn't let up much compared to March. Overall April brings with it patches ...

Read More

Crypter-as-a-Service Helps jRAT Fly Under The Radar

(Contributor: Dr. Fahim Abbasi and Phil Hay)

Read More

Patch Tuesday, March 2018

March is coming in like a lion with this Patch Tuesday. The release patches 73 CVEs and includes ...

Read More

Fake ASIC Renewal Spam Delivers Malware to Australian Companies

The Australian Securities and Investment Commission (ASIC) is an independent government agency that ...

Read More

Multi-Stage Email Word Attack Without Macros

Malware authors often distribute malware through code macros in Microsoft Office documents such as ...

Read More

Advanced Deception with BEC Fraud Attacks

Background Business Email Compromise (BEC) email fraud, also known as "CEO Fraud" or "Whaling", has ...

Read More

Flash Zero Day (CVE-2018-4878)

A zero day Flash exploit caught targeting South Korean users was announced by South Korea's CERT on ...

Read More

Microsoft Patch Tuesday, February 2018

February's Patch Tuesday is here and after the light January, it's back with patches for 50 CVEs ...

Read More

Mass MikroTik Router Infection – First we cryptojack Brazil, then we take the World?

On July 31st , just after getting back to the office from my talk at RSA Asia 2018 about how cyber ...

Read More

Multiple Vulnerabilities in NETGEAR Routers

Last year I discovered multiple vulnerabilities in NETGEAR products. Now that these vulnerabilities ...

Read More

Multiple Vulnerabilities in WD MyCloud

While performing security research on personal storage I found some vulnerabilities in the WD ...

Read More

Inspecting Encrypted Network Traffic with JA3

Part of our job as security researchers is keeping up with new tools and techniques used to monitor ...

Read More