ModSecurity version 3.0.0 first release candidate
Recently we announced the first release candidate for libModSecurity (also as known as ModSecurity ...
Read MoreRecently we announced the first release candidate for libModSecurity (also as known as ModSecurity ...
Read MoreI normally use Linux for my malware analysis lab machine. But, recently, I got interested in the ...
Read MoreOver two days in early August (the 8th and 9th), amidst of the active distribution of Trickbot ...
Read MoreWe have released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and ...
Read MoreWe recently released ModSecurity version 2.9.2. The release contains a number of bug fixes, ...
Read MoreAugust's Patch Tuesday brings with it a relatively light month closing holes in 48 CVEs. Over all ...
Read MoreRecently, Jason Knowles of ABC 7's I-Team asked us, "What is the security risk if your EMV chip ...
Read MoreA couple of weeks ago, we observed the Necurs botnet distributing a new malware spam campaign with ...
Read MoreContributed by: Gerald Carsula, Rodel Mendez and Nicholas Ramos
Read MoreWe have released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and ...
Read MoreMost malware that traverses a network do so with specific indicators, some of which look like ...
Read MoreJuly's Patch Tuesday brings patches for 54 CVEs, nearly half the number patched in June and back to ...
Read MoreTrustwave recently reported a remotely exploitable computational complexity vulnerability in the ...
Read MoreRansomware seem to be the trend now and this type of malware will no doubt continue to grow. But do ...
Read MoreBrute force attacks against smartphones are not usually a viable attack vector. Manufacturers ...
Read MoreOver the years WiFi Routers have been notoriously susceptible to simple attacks. In early 2017, ...
Read MoreThis is an ongoing, emerging story and may be updated after posting.
Read MoreThe stability of any given project is often tracked by its maturity, which is generally measured by ...
Read MoreMore than four years ago, we published a series of blogs discussing in-depth analysis of Alina ...
Read MoreWe have just released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and ...
Read MoreWe previously outlined a spam campaign that delivered FAKEGLOBE and CERBER ransomwares. This week ...
Read MoreFor the June 2017 Patch Tuesday Microsoft is releasing 97 CVEs, nearly double the number of ...
Read MoreWannaCry is a network worm that exploits a vulnerability in Microsoft's implementation of the SMB ...
Read MoreRecently, we observed a constant influx of spam that distributes two ransomware families, perhaps ...
Read MoreThe Necurs botnet, which was responsible for millions of malicious spam messages last year, has ...
Read MoreThe infamous data-stealing URSNIF malware has done it again and it's here to collect more ...
Read MoreNormal IDPS signatures using either Snort or Suricata have quite a few options and, if regex is ...
Read More