The Petya/NotPetya Ransomware Campaign
This is an ongoing, emerging story and may be updated after posting.
Read MoreThis is an ongoing, emerging story and may be updated after posting.
Read MoreThe stability of any given project is often tracked by its maturity, which is generally measured by ...
Read MoreMore than four years ago, we published a series of blogs discussing in-depth analysis of Alina ...
Read MoreWe have just released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and ...
Read MoreWe previously outlined a spam campaign that delivered FAKEGLOBE and CERBER ransomwares. This week ...
Read MoreFor the June 2017 Patch Tuesday Microsoft is releasing 97 CVEs, nearly double the number of ...
Read MoreWannaCry is a network worm that exploits a vulnerability in Microsoft's implementation of the SMB ...
Read MoreRecently, we observed a constant influx of spam that distributes two ransomware families, perhaps ...
Read MoreThe Necurs botnet, which was responsible for millions of malicious spam messages last year, has ...
Read MoreThe infamous data-stealing URSNIF malware has done it again and it's here to collect more ...
Read MoreNormal IDPS signatures using either Snort or Suricata have quite a few options and, if regex is ...
Read MoreTheShadowBrokers have just released a blog post (written in a child-like style to mock the lack of ...
Read MoreContributors: Phil Hay, Rodel Mendrez, Gerald Carsula, Nicholas Ramos, Homer Pacag For the last few ...
Read MoreFor the last few days the WannaCry ransomware event created mayhem, where organizations worldwide ...
Read MoreBy now you have likely heard about the WannaCry (aka WannaCrypt) ransomware campaign that has taken ...
Read MoreMicrosoft is releasing 56 CVEs for the May 2017 Patch Tuesday today. This includes 15 CVEs rated ...
Read MoreLast year I decided to do some security research on an antivirus product. Avast seemed a good ...
Read MoreApril Patch Tuesday is here and, like the change of the seasons, this release comes with changes in ...
Read MoreOne of the most common and largely overlooked vulnerabilities by web developers is Open Redirect ...
Read MoreIn the previous posts, Steganography... what is that? and Steganalysis, the Counterpart of ...
Read MoreIn the realm of malware, ransomware has been king for the last few years, compromising unsecured ...
Read MoreI was recently working on an external network penetration test where I identified a new ...
Read MoreIntroduction During a recent incident response case, we were tasked with discovering the point of ...
Read MoreThis month's update for Database Security Knowledgebase is now available. Knowledgebase version ...
Read MoreWe knew that the Microsoft's Valentine's gift to cancel Patch Tuesday on February 14th was only ...
Read More