Windows Debugging & Exploiting Part 1 - Environment Setup
October 23, 2019 | Bruno Oliveira
Introduction In this blog series, I will try to set some base knowledge for ...
Messing with Azorult Part 2: Command and Control
October 18, 2019 | Rodel Mendrez
As we mentioned in our earlier blog, Azorult is very popular in the underground ...
Messing with Azorult Part 1: Malware Breakdown
October 15, 2019 | Rodel Mendrez
In this blog series, we dive into an information stealing Trojan called Azorult ...
Patch Tuesday, October 2019
October 08, 2019 | Karl Sigler
Microsoft’s security update for the month of October is one of the lightest ...
Chaining Low/Info Level Vulnerabilities for Pwnage
September 30, 2019 | Liam Somerville
Chained Critical Everyone gets critical. It’s part of our vernacular: ...
Documents with IRM Password Protection Lead to Remcos RAT
September 27, 2019 | Diana Lopera
Documents attached to emails are commonly used as the initial vector to deliver ...
Digital Canaries in a Coal Mine: Detecting Enumeration with DNS and AD
September 26, 2019 | Stephan Borosh
Introduction A fundamental part of any network is the Domain Name Service ...
Tracking the Chameleon Spam Campaign
September 25, 2019 | Dr. Fahim Abbasi
In this blog, we draw attention to a persistent high-volume spam campaign that ...
Microsoft Internet Explorer Remote Code Execution 0-Day (CVE-2019-1367)
September 24, 2019 | SpiderLabs Researcher
Microsoft released an out-of-band patch for a 0-day vulnerability in Internet ...
Remote Code Execution and other Vulnerabilities in WS_FTP Server
September 18, 2019 | Dan Bastone and Devon Greene
CVE-2019-12143, CVE-2019-12144, CVE-2019-12145, CVE-2019-12146: Multiple ...
Getting Started With Azure DevOps
September 18, 2019 | Stephan Borosh
Recently, I set out to find a simple solution to manage the building of all my ...
Patch Tuesday, September 2019
September 11, 2019 | Karl Sigler
For September 2019, Microsoft is releasing 78 CVEs. Of these CVEs, 17 are rated ...
Multiple Vulnerabilities in Comba and D-Link Routers
September 10, 2019 | Karl Sigler
Overview There are five new credential leaking vulnerabilities discovered and ...
Lord EK: A New Exploit Kit with an Ambitious Name
September 06, 2019 | Nikita Kazymirskyi
After a bit of a lull in the world of exploit kits, a new exploit kit by the ...
Digging Deep into Magecart Malware Part II
September 04, 2019 | Rodel Mendrez
Magecart is the name given to notorious groups of hackers that target online ...
Hyper-V’s Guest/Host Attack Surface: A Quick Look
August 20, 2019 | Drew Noel
An overview of Hyper-V’s guest/host communications and attack surface.
Patch Tuesday, August 2019
August 13, 2019 | Karl Sigler
The August Patch Tuesday is here ringing in patches for a massive 97 CVEs. ...
Trustwave Wins the Threat Indicator Top Contributor Award from Microsoft
August 12, 2019 | Ziv Mador
Over the years, cyber-attacks have become widespread and increasingly ...
AttackSurfaceMapper - Automate and Simplify the OSINT Process
August 07, 2019 | Andreas Georgiou
[+] Introduction:
SanDisk SSD Dashboard Vulnerabilities: CVE-2019-13466 & CVE-2019-13467
July 31, 2019 | Martin Rakhmanov
While recently upgrading my laptop with a new Solid State Drive (SSD), I ...
Hiding PHP Code in Image Files Revisited
July 26, 2019 | Rodel Mendrez
Over five years ago, we published a blog detailing how a webshell’s backdoor ...
Breaking Smart [Bank] Statements
July 25, 2019 | Manuel Nader
Context In Mexico, it’s possible to receive your monthly bank statement via ...
HQL Injection Exploitation in MySQL
July 18, 2019 | Olga Barinova
Are you familiar with an HQL injection exploitation? Chances are you’re not. ...
Hardcoded Credentials in Uniguest Kiosk Software Lead to API Compromise
July 11, 2019 | Adrian Pruteanu
If you've traveled at all within North America, you've likely at some point ...
“Sexfavor” Email Scam Delivers Danabot
July 09, 2019 | Diana Lopera
Sextortion has been a widely used theme in spam campaigns since Q1 of 2018. ...
Patch Tuesday, July 2019
July 09, 2019 | Karl Sigler
Patch Tuesday for July is here and after the massive release in June, the 77 ...
Executing Code Using Microsoft Teams Updater
July 08, 2019 | Charles Hamilton
Red Teamers like to hunt for new methods of code execution through “legitimate” ...
UNC Path Injection with Microsoft Access
June 24, 2019 | Stephan Borosh
Introduction Steve Borosh is a Principal Security Consultant for Trustwave and ...