Microsoft Internet Explorer 0-Day (CVE-2014-1776)
A zero-day vulnerability in Microsoft Internet Explorer, CVE-2014-1776, was recently discovered ...
Read MoreA zero-day vulnerability in Microsoft Internet Explorer, CVE-2014-1776, was recently discovered ...
Read MoreRecently I have noticed more use of .lnk files used in malware distribution via email. These files ...
Read MoreSubmitted by Felipe Costa and Ryan Barnett (SpiderLabs Research - ModSecurity Team)
Read MoreTrustwave SpiderLabs security researcher Jonathan Claudius has discovered a privilege escalation ...
Read MoreNetSupport allows corporations to remotely manage and connect to PC's and servers from a central ...
Read MoreThe 17th of April fell this week, which means it is Oracle Critical Patch Update (CPU) time. The ...
Read MoreIn this episode I bid a fond farewell to Windows XP; Microsoft patches that RTF 0-day ...
Read MoreAs Karl noted in his Patch Tuesday post, yesterday was the last day of support for Windows XP.
Read MoreIn this third installment of Detecting A Surveillance State blog series I will move away from ...
Read MoreApart from our typical application penetration testing engagements, clients sometimes come to us ...
Read MoreApril's Microsoft Patch Tuesday is on par with the prior releases this year. There are only four ...
Read MoreIn this episode I talk about GMail making HTTPS mandatory, a move some people don't like; Microsoft ...
Read MoreA zero-day vulnerability in Microsoft Word involving the handling of the RTF file format was ...
Read MoreThe Microsoft April security release is almost upon us with security updates scheduled to deploy on ...
Read MoreDuring our last ATM review engagement, we found some interesting executable files that were run by ...
Read MoreOn a recent gig I was hit with hundreds of hosts running a service on port TCP 5405, the NetSupport ...
Read MoreLooking to refinance your house? Install solar panels? Hey, this email about refinancing (or solar ...
Read MoreSince 2003 a large part of my workday has been devoted solely to hacking systems. Over this time ...
Read MoreOur web honeypots picked up some increased exploit attempts for an old Joomla Content Editor (JCE) ...
Read MoreIn this episode we talk about the Windigo malware campaign, how a well-intentioned hacker brought ...
Read MoreOWASP is again participating in the Google Summer of Code (GSoC) Program for 2014 by acting as a ...
Read MoreIn a previous blog post, I provided "Method of Entry" analysis for a ColdFusion compromise baed on ...
Read MoreIn the last post we reviewed a few hardware implants that may have been used by surveillance states ...
Read MoreIn this episode we talk about Microsoft Patch Tuesday providing patches for an Internet Explorer ...
Read More