BlackByte Ransomware – Pt 2. Code Obfuscation Analysis
In Part 1 of our BlackByte ransomware analysis, we covered the execution flow of the first stage ...
Read MoreIn Part 1 of our BlackByte ransomware analysis, we covered the execution flow of the first stage ...
Read MoreEdge Services It’s well known that we just don’t put services or devices on the edge of the ...
Read MoreThe typical process when scoping a penetration test is to get a list of targets from the client, ...
Read MoreThe security landscape is always changing. New features are coming out all the time, but often ...
Read MoreHere we are in August and it's Patch Tuesday once more. It's another light month with only 9 CVEs ...
Read MoreTrustwave SpiderLabs recently undertook a survey of some 100 popular WordPress plugins for possible ...
Read MoreSummary Secret-Chats in Telegram use end-to-end encryption, which is meant for people who are ...
Read MoreAnyone who has ever read a vulnerability scan report will know that scanners often include a large ...
Read MoreON24 presenter mode requires you to install a plugin that is used to share your screen. For the ...
Read MoreWe're a little over halfway through the year now as July's Patch Tuesday is released and it's been ...
Read MoreModSecurity is an open-source WAF engine maintained by Trustwave. This blog post discusses an input ...
Read MoreOn, July 2nd, a massive ransomware attack was launched against roughly 60 managed services ...
Read MoreSometimes when pen-testing a large network you come across a few exposed web hosts running ...
Read MoreSometimes when pen-testing a large network you come across a few exposed web hosts running ...
Read MoreThe use of novel disk image files to encapsulate malware distributed via spam has been a theme that ...
Read MoreBackground On May 25th, 2021, VMWare released patches to address VMSA-2021-0010, a critical ...
Read MoreSummer is officially here and with it June's Patch Tuesday. This is a surprisingly light month with ...
Read MoreIn today's world, more and more devices are connected to the Internet for on-the-go connectivity. ...
Read MoreUntil recently, I really didn't care about web applications on an internal penetration test. ...
Read MoreIn the May 2021 Microsoft update, Microsoft patched an HTTP.sys vulnerability that has the ability ...
Read MoreSharepoint is generally used as an intranet site, to share news and other internal company ...
Read MoreMay's Patch Tuesday is upon us and probably the most surprising thing about the release is that ...
Read MoreIntroduction In this post, we analyze a piece of malware that we encountered during a recent breach ...
Read More“All your base are belong to us”, Zero game 1992
Read MoreApril's Patch Tuesday is upon us and it is showering us with patches for a total of 108 CVEs. This ...
Read MoreThis blog investigates an interesting phishing campaign we encountered recently. In this campaign, ...
Read MoreUmbraco version 8.9.0 (also seen in 8.6.3) has a privilege escalation issue in the core ...
Read MoreFrom time to time, we all receive some unexpected messages. Either through social media or email. ...
Read More