Turning Up The Heat on IoT: TRANE Comfortlink XL850

The Internet of Things (IoT) continues to explode in the consumer market as demand for network ...

Read More

To Obfuscate, or not to Obfuscate

Introduction Malware's goal is to bypass computer defenses, infect a target, and often remain on ...

Read More

SAP ASE file creation vulnerability (CVE-2016-6196)

Recently SAP released a patch for an Adaptive Server Enterprise vulnerability that allows ...

Read More

Denial of Service: A Survival Guide

From Anonymous style SYN flooding to Application layer denial of service, denial of service is a ...

Read More

Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Introduction

Read More

Microsoft Patch Tuesday, July 2016

July's Patch Tuesday is here and brings with it five bulletins rated Critical and 6 rated ...

Read More

How I Cracked a Keylogger and Ended Up in Someone's Inbox

It all started from a spam campaign. Figure 1 shows a campaign we picked up recently from our spam ...

Read More

Malware Authors Adopt CEO Fraud Techniques

CEO Fraud scams, a type of Business Email Compromise (BEC), have gained popularity among scammers ...

Read More

CEO Fraud Scams and How to Deal With Them at the Email Gateway

Email scams known as "CEO Fraud" are very common right now. They are a type of "Business Email ...

Read More

PoSeidon Adventures in Memory

Background

Read More

About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)

After patching set of issues reported by Trustwave SpiderLabs last month, Lenovo released another ...

Read More

Linux Kernel ROP - Ropping your way to # (Part 2)

Introduction In Part 1 of this tutorial, we have demonstrated how to find useful ROP gadgets and ...

Read More

Microsoft Patch Tuesday, June 2016

June's Patch Tuesday doesn't hold many surprises and is similar to the past several months with 17 ...

Read More

Linux Kernel ROP - Ropping your way to # (Part 1)

Kernel ROP In-kernel ROP (Return Oriented Programming) is a useful technique that is often used to ...

Read More

Zero Day Auction for the Masses

UPDATE: The seller once again lowered their price on the 6th of June to $85,000USD. This means that ...

Read More

Digging in the Spam Folder

Introduction Unlike spam that appears in my real-world mailbox, the numerous unwanted parcels that ...

Read More

Suzy’s Phishing Season

Although most SWG-related blogs talk about exploit kits and malicious code, today we would like to ...

Read More

Earlier Flaws Revisited: MS Office and PDF Combo Attack

Recently, we came across a campaign spamming out emails containing both DOC and PDF attachments ...

Read More

About SAP ASE DSAM SQL Injection (CVE-2016-4013)

SAP introduced a new feature in SP02 for Adaptive Server Enterprise 16.0 that provides support for ...

Read More

Database Security Knowledgebase Update 5.01

This month's update for Database Security Knowledgebase is now available.

Read More

Privilege Escalation Vulnerability In Lenovo Solution Center (CVE-2016-1876)

Trustwave has reported several issues in Lenovo software in the past. Last week Lenovo published an ...

Read More

Microsoft Patch Tuesday, May 2016

May's Patch Tuesday is here and brings with it 16 Bulletins with 51 unique CVEs. The bulletins are ...

Read More

Microsoft Patch Tuesday, April 2016

April is here and with it comes a new Patch Tuesday. This month Microsoft is releasing 13 bulletins ...

Read More

Intercepting SSL And HTTPS Traffic With mitmproxy and SSLsplit

Looking for vulnerabilities in mobile applications and smart home devices presents multiple ...

Read More

TWSL2016-006: Multiple XSS Vulnerabilities reported for Zen Cart

Today Trustwave released a vulnerability advisory in conjunction with Zen Cart. Researchers from ...

Read More

Every Tool in the Tool Box

Introduction When I teach people about reverse engineering, I often hear the following statement: ...

Read More

Angler Takes Malvertising to New Heights

We have just discovered an advertising campaign that has been placing malicious advertisements on ...

Read More

TWSL2016-004: Multiple Cross-Site Scripting (XSS) Vulnerabilities in Magnolia CMS

Trustwave SpiderLabs published an advisory today in conjunction with Magnolia International Ltd. ...

Read More