10,000 Litecoins Worth $230,000 USD Were Stolen!
Newspapers, commentators and bloggers have lately been asking whether digital currencies, such as ...
Read MoreNewspapers, commentators and bloggers have lately been asking whether digital currencies, such as ...
Read MoreInjection of malicious code into JavaScript files is not new; however, we recently observed a steep ...
Read MoreSo I do networking (computers and wifi things) at a number of security conferences (Thotcon & ...
Read MoreIt's the second Tuesday in January, so it is Oracle Critical Patch Update (CPU) time. The January ...
Read MoreThis blog post continues with the topic of setting "HoneyTraps" within your web applications to ...
Read MoreHopefully January's Patch Tuesday is a sign of things to come for 2014. With only four bulletins, ...
Read MoreIn this week's podcast we talk about malware offered up in onlines ads, the return of email hacker ...
Read MoreSAP Sybase Adaptive Server Enterprise is a relational database management product used to store ...
Read MoreMicrosoft is scheduled to release the next security update for consumers on January 14th with ...
Read MoreWelcome to the SpiderLabs Radio Reboot! As we bid our old host, Space Rogue, a fond farewell, we ...
Read MoreOne might think that vulnerabilities in ActiveX controls are a thing of the past, but we continue ...
Read MoreDuring a recent application penetration test, I came across what proved to be an interesting SQL ...
Read MoreSince 2003 a large part of my workday has been devoted solely to hacking systems. Over this time ...
Read MoreLast Winter, Snotnose won the North vs South Pole CTF contest, and Santa awarded him the ultimate ...
Read MorePassword recovery functionalities can result in vulnerabilities in the same application they are ...
Read MoreI haven't come into contact with Joomla for a while, but I had the opportunity recently in a ...
Read MoreThe ModSecurity Project team is pleased to announce public release version 2.7.6. Full Release ...
Read MoreEarlier this week, SpiderLabs Research team released a blog post outlining analysis of a malicious ...
Read MoreSpiderLabs investigates a number of suspicious binary files on a daily basis. A week ago we came ...
Read More'Tis the season for an increase in cyber-criminal activities. In the past couple months, ...
Read MoreRecently, we've seen a few instances of a malicious DLL that is installed as an IIS module making ...
Read MoreOn December 10th, Microsoft will begin deploying their security updates to consumers with affected ...
Read MoreTen years ago, Congress passed the "CAN-SPAM Act" (also known as theYou-CAN-SPAM Act, since it ...
Read MoreThis post is the conclusion of a three-part series (read the first here and the second here) that ...
Read MoreIn our last episode of "Look What I Found" we talked about a fairly large instance of the Pony ...
Read MoreIn the past 24 hours, one of the WASC Distributed Web Honeypot participant's sensors picked up ...
Read MoreResponder is a penetration-testing tool in active development. To continue making it the best tool ...
Read More