Wendel's Small Hacking Tricks - The Annoying NT_STATUS_INVALID_WORKSTATION.
Since 2003 a large part of my workday has been devoted solely to hacking systems. Over this time ...
Read MoreSince 2003 a large part of my workday has been devoted solely to hacking systems. Over this time ...
Read MoreOur web honeypots picked up some increased exploit attempts for an old Joomla Content Editor (JCE) ...
Read MoreIn this episode we talk about the Windigo malware campaign, how a well-intentioned hacker brought ...
Read MoreOWASP is again participating in the Google Summer of Code (GSoC) Program for 2014 by acting as a ...
Read MoreIn a previous blog post, I provided "Method of Entry" analysis for a ColdFusion compromise baed on ...
Read MoreIn the last post we reviewed a few hardware implants that may have been used by surveillance states ...
Read MoreIn this episode we talk about Microsoft Patch Tuesday providing patches for an Internet Explorer ...
Read MoreA lot has already been said about CVE-2014-0502, the Adobe Flash Player zero-day that was part of a ...
Read MoreThere were news stories this week outlining how attackers are abusing the XML-PRC "pingback" ...
Read MoreThis is the first in a series of four blog posts that will cover defenses and detection methods for ...
Read MoreMarch's Patch Tuesday includes five bulletins, two rated "Critical" and three rated "Important". ...
Read MoreThis is the third and final part on the subject of Touchlogging. I do recommend reading part one ...
Read MoreIn this episode we talk about a new Russian rootkit called Uroburos, another bitcoin exchange ...
Read MoreThis is part two in my Touchlogging series, you can find part one here.
Read MoreThe Microsoft Security release for March will include patches for Windows, Internet Explorer and ...
Read MoreSubmitted by Ziv Mador and Ryan Barnett
Read MoreIn this blog post, we'll be describing the functionality of a spamming botnet which appears to have ...
Read MoreAlthough there have been numerous articles posted, I thought I would write about my recent ...
Read MoreIn this episode we talk about the Apple "gotofail" SSL vulnerability, SEA is still around and ...
Read MoreIn our previous episode of "Look What I Found" we detailed our discovery of a humongous instance of ...
Read MoreIn this episode we look at the new Linksys worm dubbed TheMoon, two new exploits target a 0 day ...
Read MoreRecently, several security vendors reported about a new IE 0day which affects version 9 and 10. The ...
Read MoreThis blog post will discuss a section from Recipe 8-5: Detecting Browser Fingerprint Changes During ...
Read MoreOur team's discovery of the spoils of yet another instance of Pony 1.9 has kept us busy the past ...
Read MoreThe power and flexibility of Responder has grown significantly over the past year. Responder is a ...
Read MoreWhen attackers compromise a website and want to harvest credit cards, they need to either find ...
Read MoreIn this episode we look at Facebook's open-sourcing of the Android crypto API "Conceal", more POS ...
Read MoreA little over a month ago, I published a Metasploit auxiliary module for brute-forcing Cisco ASDM ...
Read More