Multi-Stage Email Word Attack Without Macros
Malware authors often distribute malware through code macros in Microsoft Office documents such as ...
Read MoreMalware authors often distribute malware through code macros in Microsoft Office documents such as ...
Read MoreBackground Business Email Compromise (BEC) email fraud, also known as "CEO Fraud" or "Whaling", has ...
Read MoreA zero day Flash exploit caught targeting South Korean users was announced by South Korea's CERT on ...
Read MoreFebruary's Patch Tuesday is here and after the light January, it's back with patches for 50 CVEs ...
Read MoreOn July 31st , just after getting back to the office from my talk at RSA Asia 2018 about how cyber ...
Read MoreLast year I discovered multiple vulnerabilities in NETGEAR products. Now that these vulnerabilities ...
Read MoreWhile performing security research on personal storage I found some vulnerabilities in the WD ...
Read MorePart of our job as security researchers is keeping up with new tools and techniques used to monitor ...
Read MoreOver the past few months there has been a lot going on with ModSecurity. There was libModSecurity ...
Read MorelibModSecurity aka ModSecurity version 3.0 is out there. libModSecurity starts a new era in terms ...
Read MoreHappy 2018 everyone! January's Patch Tuesday will ease you into the new year with just 23 CVEs ...
Read MoreA week ago, the author of BrickerBot claimed that they retired and published their manifesto along ...
Read MoreLike good old Microsoft Office Macros, Compiled HTML (CHM) Help files have been utilized by malware ...
Read MoreIf you thought using BAT files was an old hat, think again. While monitoring our Secure Email ...
Read MoreToday marks the last Microsoft Patch Tuesday of 2017 and, with only 34 CVEs patched, it's one of ...
Read MoreAs a penetration tester, attaining Windows domain credentials are akin to gaining the keys to the ...
Read MoreThese days many vendors, like IoT vendors, use Linux running on top of ARM CPU for their embedded ...
Read MoreWhen big high-tech companies like Apple, Red Hat and Cisco use PostgreSQL in their data ...
Read MoreIt's that time of the month again for Microsoft updates. November's Patch Tuesday brings with it ...
Read MoreA vulnerability in the web front-end of Brother printers (called Debut) allows an attacker to ...
Read MoreAlbert Einstein once said, "Out of Complexity, Find Simplicity" but it also seems that simplicity ...
Read MoreSome time ago, a person reached out to Trustwave to get answers regarding some news that he saw ...
Read MoreWe have recently released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 ...
Read MoreIt's that time of year when the seasons are changing. The Northern Hemisphere moves into Autumn, ...
Read MoreOctober is here and brings with it patches for 62 CVEs and a handful of additional advisories. 28 ...
Read MoreToday we are publishing a SpiderLabs Advanced Threat Report that details a major cyberattack ...
Read MoreThe seventh entry on the most recent OWASP Top 10 release (from 2013, due to the 2017 release ...
Read MoreWe have released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and ...
Read More