My Other Ride is Your Image Upload Script(1)

Many security issues are based upon mistaken assumptions. For instance, when testing applications, ...

Read More

My Other Ride is Your Image Upload Script

Many security issues are based upon mistaken assumptions. For instance, when testing applications, ...

Read More

TWSL2011-004: Cross-Site Scripting Vulnerability in ZyXEL ZyWALL 70 Firewall(1)

The SpiderLabs team at Trustwave published a new advisory today, which details a vulnerability ...

Read More

ModSecurity Advanced Topic of the Week: Unicode Mapping Support

Read More

ModSecurity Happy Hour at Blackhat USA 2011

I am excited to announce that SpiderLabs will be hosting a ModSecurity Happy Hour during the ...

Read More

Announcing Release of OWASP ModSecurity Core Rule Set v2.2.0

The ModSecurity Development Team is pleased to announce the release of the OWASP ModSecurity Core ...

Read More

Analysis and Evolution of MacDefender OS X Fake AV Scareware

Over the last month, a new fake AV scareware variant has been circulating for OS X which has been ...

Read More

Announcing Release of ModSecurity v2.6.0

The ModSecurity Development Team is pleased to announce the availability of ModSecurity 2.6.0 ...

Read More

National Cyber Safety Awareness Day is May 17th

We're taking a short break from our normal technical posts to write about "National Cyber Safety ...

Read More

Analyzing Malware Hollow Processes

The Malware Analyst's Cookbook is a great book. In it the authors talked about an interesting ...

Read More

Latest Web Hacking Incident Database (WHID) Entries

These are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...

Read More

Unicode Visual Spoofing for Good: Confusable CAPTCHAs

In this blog post, I will show a proof of concept method of leveraging Unicode Visual ...

Read More

Latest Web Hacking Incident Database (WHID) Entries (1)

These are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...

Read More

ModSecurity Advanced Topic of the Week: Passive Vulnerability Scanning Part 2 - Watcher Checks

In a previous blog post entitled "ModSecurity Advanced Topic of the Week: Passive Vulnerability ...

Read More

Latest Web Hacking Incident Database (WHID) Entries(2)

These are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...

Read More

Reaching Trustwave's WebDefend Minus World

So my inbox lit up today with a Full Disclosure note about a vulnerability in Trustwave's ...

Read More

Detecting Malice with ModSecurity: Request Method Anomalies

This week's installment of Detecting Malice with ModSecurity will discuss how to detect HTTP ...

Read More

Who's in the Driver's Seat?

Events over the last seven days have dramatically underlined the pitfalls and difficulties of ...

Read More

Latest Web Hacking Incident Database (WHID) Entries (3)

These are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...

Read More

ModSecurity Advanced Topic of the Week: Integrating IDS Signatures

Snort Web Attack Rules You may be familiar with the Emerging Threats project. They have a few Snort ...

Read More

ModSecurity 2.6.0-rc1 is now available

The ModSecurity Development Team is pleased to announce the availability of ModSecurity 2.6.0-rc1 ...

Read More

Latest Web Hacking Incident Database (WHID) Entries (4)

These are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...

Read More

Securing the Fifth Domain

In May 2010, the final disappearance of the line between physical and virtual security became ...

Read More

ModSecurity Advanced Topic of the Week: Integrating Content Security Policy (CSP)

Mozilla's Content Security Policy (CSP) Mozilla has developed a fantastic security capability into ...

Read More

Latest Web Hacking Incident Database (WHID) Entries (5)

These are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...

Read More

CSS and XSS in Melodious Harmony

Web application penetration testers, have you ever run into a situation where you can inject into ...

Read More

ModSecurity Advanced Topic of the Week: Malware Link Removal

This is a follow-up post to ModSecurity Advanced Topic of the Week: Malware Link Detection in which ...

Read More

Analysis of LizaMoon: Stored XSS via SQL Injection

Blended Attacks

Read More