Deep Analysis of CVE-2014-0502 – A Double Free Story

A lot has already been said about CVE-2014-0502, the Adobe Flash Player zero-day that was part of a ...

Read More

WordPress XML-RPC PingBack Vulnerability Analysis

There were news stories this week outlining how attackers are abusing the XML-PRC "pingback" ...

Read More

Detecting A Surveillance State - Part 1 Hardware Implants

This is the first in a series of four blog posts that will cover defenses and detection methods for ...

Read More

Microsoft Patch Tuesday, March 2014

March's Patch Tuesday includes five bulletins, two rated "Critical" and three rated "Important". ...

Read More

Touchlogging Part 3 - Final Thoughts

This is the third and final part on the subject of Touchlogging. I do recommend reading part one ...

Read More

SpiderLabs Radio: March 7, 2014

In this episode we talk about a new Russian rootkit called Uroburos, another bitcoin exchange ...

Read More

Touchlogging Part 2 - Android

This is part two in my Touchlogging series, you can find part one here.

Read More

Microsoft Advance Notification for March 2014

The Microsoft Security release for March will include patches for Windows, Internet Explorer and ...

Read More

Bloodletting the Arms Race: Using Attacker's Techniques for Defense

Submitted by Ziv Mador and Ryan Barnett

Read More

Gamut Spambot Analysis

In this blog post, we'll be describing the functionality of a spamming botnet which appears to have ...

Read More

Touchlogging Part 1 - iOS

Although there have been numerous articles posted, I thought I would write about my recent ...

Read More

SpiderLabs Radio: February 27, 2014

In this episode we talk about the Apple "gotofail" SSL vulnerability, SEA is still around and ...

Read More

Look What I Found: Pony is After Your Coins!

In our previous episode of "Look What I Found" we detailed our discovery of a humongous instance of ...

Read More

SpiderLabs Radio: February 20, 2014

In this episode we look at the new Linksys worm dubbed TheMoon, two new exploits target a 0 day ...

Read More

Internet Explorer Zero Day: CVE-2014-0322

Recently, several security vendors reported about a new IE 0day which affects version 9 and 10. The ...

Read More

ModSecurity Advanced Topic of the Week: Detecting Browser Fingerprint Changes During Sessions

This blog post will discuss a section from Recipe 8-5: Detecting Browser Fingerprint Changes During ...

Read More

FAQ: Pony Malware Payload Discovery

Our team's discovery of the spoils of yet another instance of Pony 1.9 has kept us busy the past ...

Read More

Responder 2.0 - Owning Windows Networks part 3

The power and flexibility of Responder has grown significantly over the past year. Responder is a ...

Read More

Wait a minute... that’s not a real JPG!

When attackers compromise a website and want to harvest credit cards, they need to either find ...

Read More

SpiderLabs Radio: February 13, 2014

In this episode we look at Facebook's open-sourcing of the Android crypto API "Conceal", more POS ...

Read More

“Reversing” Non-Proxy Aware HTTPS Thick Clients w/ Burp

A little over a month ago, I published a Metasploit auxiliary module for brute-forcing Cisco ASDM ...

Read More

Microsoft Patch Tuesday, February 2014

February's Patch Tuesday is back to business as usual after the light January release. This month's ...

Read More

JackPOS – The House Always Wins

A new point of sale (POS) malware family could be a jackpot for credit card thieves. I recently ...

Read More

The Keystone Rocks - Foundation Chips of Pentesting Tips Part 1

The knowledgebase of a penetration tester can be broadly split into two categories: Relevant ...

Read More

CVE-2014-0050: Exploit with Boundaries, Loops without Boundaries

In this article I will discuss CVE-2014-0050: Apache Commons FileUpload and Apache Tomcat ...

Read More

SpiderLabs Radio: February 7, 2014

In this episode I talk about a new Adobe zero day in Flash Player, the Chewbacca POS malware, a new ...

Read More

Microsoft Advance Notification for February 2014

***Update as of Monday, February 10, 2014***

Read More

Spammers Are Taking Advantage of Your Whitelists by Spoofing Legitimate Brands

***EDITOR'S NOTE: The content of this article does not make or imply any claims regarding the ...

Read More