Touchlogging Part 3 - Final Thoughts
This is the third and final part on the subject of Touchlogging. I do recommend reading part one ...
Read MoreThis is the third and final part on the subject of Touchlogging. I do recommend reading part one ...
Read MoreIn this episode we talk about a new Russian rootkit called Uroburos, another bitcoin exchange ...
Read MoreThis is part two in my Touchlogging series, you can find part one here.
Read MoreThe Microsoft Security release for March will include patches for Windows, Internet Explorer and ...
Read MoreSubmitted by Ziv Mador and Ryan Barnett
Read MoreIn this blog post, we'll be describing the functionality of a spamming botnet which appears to have ...
Read MoreAlthough there have been numerous articles posted, I thought I would write about my recent ...
Read MoreIn this episode we talk about the Apple "gotofail" SSL vulnerability, SEA is still around and ...
Read MoreIn our previous episode of "Look What I Found" we detailed our discovery of a humongous instance of ...
Read MoreIn this episode we look at the new Linksys worm dubbed TheMoon, two new exploits target a 0 day ...
Read MoreRecently, several security vendors reported about a new IE 0day which affects version 9 and 10. The ...
Read MoreThis blog post will discuss a section from Recipe 8-5: Detecting Browser Fingerprint Changes During ...
Read MoreOur team's discovery of the spoils of yet another instance of Pony 1.9 has kept us busy the past ...
Read MoreThe power and flexibility of Responder has grown significantly over the past year. Responder is a ...
Read MoreWhen attackers compromise a website and want to harvest credit cards, they need to either find ...
Read MoreIn this episode we look at Facebook's open-sourcing of the Android crypto API "Conceal", more POS ...
Read MoreA little over a month ago, I published a Metasploit auxiliary module for brute-forcing Cisco ASDM ...
Read MoreFebruary's Patch Tuesday is back to business as usual after the light January release. This month's ...
Read MoreA new point of sale (POS) malware family could be a jackpot for credit card thieves. I recently ...
Read MoreThe knowledgebase of a penetration tester can be broadly split into two categories: Relevant ...
Read MoreIn this article I will discuss CVE-2014-0050: Apache Commons FileUpload and Apache Tomcat ...
Read MoreIn this episode I talk about a new Adobe zero day in Flash Player, the Chewbacca POS malware, a new ...
Read More***Update as of Monday, February 10, 2014***
Read More***EDITOR'S NOTE: The content of this article does not make or imply any claims regarding the ...
Read MoreIn this episode we look at a rash of gas pump credit card skimmers, the Syrian Electronic Army ...
Read MoreThe Trustwave SpiderLabs Research team is committed to making ModSecurity the best open source WAF ...
Read MoreThis blog post presents a powerful feature of ModSecurity v2.7 that has been highly under-utilized ...
Read MoreIn this episode I sit down with Grayson Lenik, a forensic expert for Trustwave SpiderLabs. We talk ...
Read More