TWSL2016-005: Memory corruption in a third-party component: how to find what’s wrong
In continuation of this post: ...
Read MoreIn continuation of this post: ...
Read MoreWhile researching inter-process communication on Mac OS X, I found a small security issue with ...
Read MoreWe are currently seeing extraordinarily huge volumes of JavaScript attachments being spammed out, ...
Read MoreToday is March's Patch Tuesday with 13 bulletins and 39 unique CVEs, which is about the same level ...
Read MoreIntroduction Most gamers have explored every nook and cranny of their favorite game, completing ...
Read MoreDay One: In Which The Heavens Part, But Only Slightly A few weeks ago while performing a web ...
Read MoreWe have just discovered an advertising campaign that has been placing malicious advertisements on ...
Read MoreFebruary Patch Tuesday is here with double the number of vulnerabilities that were patched in ...
Read MoreThey say that with great power comes great responsibility. In the world of websites the more ...
Read MoreRecently we have been working on the libmodsecurity project. As part of the project we no longer ...
Read MoreA couple of weeks ago we were looking at some exploit kits in one of our lab environments and ...
Read MoreIt's a new year and with it comes a fresh batch of CVEs. As expected this January's Patch Tuesday ...
Read MoreSAP released an update for SAP ASE 16.0 and 15.7 that addresses a serious security flaw discovered ...
Read MoreOne of the good things about the next generation of ModSecurity, libModSecurity (AKA ModSecurity ...
Read MorelibModSecurity is a major rewrite of ModSecurity. It preserves the rich syntax and feature set of ...
Read MoreThere's been a bit of talk about the Neutrino exploit kit lately, most of it revolving around sites ...
Read MoreIn the past year we have been exploring the Magnitude Exploit Kit - one of the major actors in the ...
Read MoreRecently we've observed a massive uptick of malicious spam with JavaScript attachments with an ...
Read MoreOverview A few weeks ago, FoxGlove Security released this important blog post that includes several ...
Read MoreOne of my "pastimes," if you will, is to check out the features of various security tools. I had ...
Read MoreA recent new 0-day in Joomla discovered by Sucuri (Sucuri Blog) has drawn a lot of attention from ...
Read MoreHave you ever wondered if all that informal training you do with your friends & family is ...
Read MoreThe December Microsoft Path Tuesday is upon us and it does not bring any happy tidings. It brings ...
Read MoreIntroduction FrameworkPoS is a well-documented family of malware that targets Point of Sale (PoS) ...
Read MoreIntroduction Working primarily with point of sale malware, we regularly see the telltale signs of ...
Read MoreIntroduction For the last five years Trustwave has been monitoring a threat across a number of ...
Read MoreSpammers try all sorts of tricks to obfuscate, including trying to obfuscate URLs so they cannot be ...
Read More