Malware Authors Adopt CEO Fraud Techniques

CEO Fraud scams, a type of Business Email Compromise (BEC), have gained popularity among scammers ...

Read More

CEO Fraud Scams and How to Deal With Them at the Email Gateway

Email scams known as "CEO Fraud" are very common right now. They are a type of "Business Email ...

Read More

PoSeidon Adventures in Memory

Background

Read More

About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)

After patching set of issues reported by Trustwave SpiderLabs last month, Lenovo released another ...

Read More

Linux Kernel ROP - Ropping your way to # (Part 2)

Introduction In Part 1 of this tutorial, we have demonstrated how to find useful ROP gadgets and ...

Read More

Microsoft Patch Tuesday, June 2016

June's Patch Tuesday doesn't hold many surprises and is similar to the past several months with 17 ...

Read More

Linux Kernel ROP - Ropping your way to # (Part 1)

Kernel ROP In-kernel ROP (Return Oriented Programming) is a useful technique that is often used to ...

Read More

Zero Day Auction for the Masses

UPDATE: The seller once again lowered their price on the 6th of June to $85,000USD. This means that ...

Read More

Digging in the Spam Folder

Introduction Unlike spam that appears in my real-world mailbox, the numerous unwanted parcels that ...

Read More

Suzy’s Phishing Season

Although most SWG-related blogs talk about exploit kits and malicious code, today we would like to ...

Read More

Earlier Flaws Revisited: MS Office and PDF Combo Attack

Recently, we came across a campaign spamming out emails containing both DOC and PDF attachments ...

Read More

About SAP ASE DSAM SQL Injection (CVE-2016-4013)

SAP introduced a new feature in SP02 for Adaptive Server Enterprise 16.0 that provides support for ...

Read More

Database Security Knowledgebase Update 5.01

This month's update for Database Security Knowledgebase is now available.

Read More

Privilege Escalation Vulnerability In Lenovo Solution Center (CVE-2016-1876)

Trustwave has reported several issues in Lenovo software in the past. Last week Lenovo published an ...

Read More

Microsoft Patch Tuesday, May 2016

May's Patch Tuesday is here and brings with it 16 Bulletins with 51 unique CVEs. The bulletins are ...

Read More

Microsoft Patch Tuesday, April 2016

April is here and with it comes a new Patch Tuesday. This month Microsoft is releasing 13 bulletins ...

Read More

Intercepting SSL And HTTPS Traffic With mitmproxy and SSLsplit

Looking for vulnerabilities in mobile applications and smart home devices presents multiple ...

Read More

TWSL2016-006: Multiple XSS Vulnerabilities reported for Zen Cart

Today Trustwave released a vulnerability advisory in conjunction with Zen Cart. Researchers from ...

Read More

Every Tool in the Tool Box

Introduction When I teach people about reverse engineering, I often hear the following statement: ...

Read More

Angler Takes Malvertising to New Heights

We have just discovered an advertising campaign that has been placing malicious advertisements on ...

Read More

TWSL2016-004: Multiple Cross-Site Scripting (XSS) Vulnerabilities in Magnolia CMS

Trustwave SpiderLabs published an advisory today in conjunction with Magnolia International Ltd. ...

Read More

TWSL2016-005: Memory corruption in a third-party component: how to find what’s wrong

In continuation of this post: ...

Read More

TWSL2016-003: Sophos Anti-Virus Mac OS X Version Update File Unlinking Vulnerability

While researching inter-process communication on Mac OS X, I found a small security issue with ...

Read More

Massive Volume of Ransomware Downloaders being Spammed

We are currently seeing extraordinarily huge volumes of JavaScript attachments being spammed out, ...

Read More

Microsoft Patch Tuesday, March 2016

Today is March's Patch Tuesday with 13 bulletins and 39 unique CVEs, which is about the same level ...

Read More

PoSeidon Completionist

Introduction Most gamers have explored every nook and cranny of their favorite game, completing ...

Read More

Data Extraction via String Concatenation in a Blind SQL Injection Vulnerability

Day One: In Which The Heavens Part, But Only Slightly A few weeks ago while performing a web ...

Read More

Angler Takes Malvertising to New Heights

We have just discovered an advertising campaign that has been placing malicious advertisements on ...

Read More