Scamming from the Cloud
Cybercriminals are leveraging reputable cloud services to relay scam email messages to their ...
Read MoreCybercriminals are leveraging reputable cloud services to relay scam email messages to their ...
Read MoreOverview With the prevalence of IoT devices flooding the mainstream marketplace, we tend to see a ...
Read MoreUpdate With the new information and developments released by FireEye, we have published a new blog ...
Read MoreOverview During observation of WinZip 24 network communications, I've noticed that it sends update ...
Read MoreThis is part three of our Schneider Electric series. You can read part one here and part two here.
Read MoreDecember's Patch Tuesday is here and, typical for the end of the year, it's a light month with only ...
Read MoreLast week we released an advisory about an SMS app called GO SMS Pro. Media files sent via text in ...
Read MoreThe GO SMS Pro application is a popular messenger app with over 100 million downloads and was ...
Read MoreThis is part 2 of a two-part series. You can read part 1 here.
Read MoreSummary: Trustwave identified a significant malicious campaign on mandatory tax invoice software, ...
Read MoreVoting in the U.S. elections started recently and there is a real concern over interference and ...
Read MoreOn October 13th, 2020, Microsoft released a patch for a critical vulnerability (CVE-2020-16898) in ...
Read MoreDirectly preceding GoldenSpy, another malware family was used to covertly access the networks of ...
Read MoreOctober's Patch Tuesday is upon us and with it comes patches for 102 CVEs. This release includes 13 ...
Read MoreA URL can be completely valid, yet still misleading. In this blog, we will present another ...
Read MoreZeroLogon has quickly become popular and well known because of multiple proofs of concept and ...
Read MoreIntroduction Today I'd like to discuss two information disclosure vulnerabilities that occur in SAP ...
Read MoreOn September 14th, researchers at security firm Secura published a white paper detailing a complete ...
Read MoreThis post is part one of a two part series. You can read part two here.
Read MoreA few days ago a new version of THE most common exploit kit was released. Unlike most exploit kit ...
Read MoreModSecurity is an open-source Web Application Firewall (WAF) engine maintained by Trustwave. The ...
Read MoreThe Qua or Quaverse Remote Access Trojan (QRAT) is a Java-based RAT that can be used to gain ...
Read MoreI’ve recently blogged about a shared memory vulnerability in Cisco WebEx Meetings Client on Windows ...
Read MoreOverview I think every penetration tester has a story about the one that got away. The bug that ...
Read MoreLast week, security researcher Amir Etemadieh (aka Zenoflex) disclosed that vBulletin’s patch for ...
Read MoreAugust's Patch Tuesday is here with 120 CVEs patched. That includes 100 rated as "Important" and 20 ...
Read MoreA good way to keep an eye on attackers and get insight on their techniques and tactics is to use a ...
Read More