Down the Rabbit Hole: Extracting Maliciousness from MSG Files Without Outlook

October 12, 2016 | Rodel Mendrez

Email As Infection Vector

Microsoft Patch Tuesday, October 2016

October 11, 2016 | SpiderLabs Researcher

October has arrived with seasonal changes and a new Microsoft Patch Tuesday. ...

RIG's Facelift

September 30, 2016 | Rami Kogan

RIG EK has been in the headlines recently mainly because both EITEST and ...

Steganography... what is that?

September 19, 2016 | Jesus Olguin

When people think about Information Security the first word that generally ...

Necurs – the Heavyweight Malware Spammer

September 14, 2016 | Phil Hay

Today we want to dwell upon a pesky botnet that goes by the name of Necurs, and ...

Microsoft Patch Tuesday, September 2016

September 13, 2016 | SpiderLabs Researcher

September's Patch Tuesday is upon us and it's the biggest one so far this year. ...

Sundown EK – Stealing Its Way to the Top

September 02, 2016 | SpiderLabs Researcher

Sundown is one of the newest Exploit Kits on the market these days, and like ...

OWASP ModSecurity CRS Version 3.0 RC1 Released

August 15, 2016 | Chaim Sanders

Trustwave has been dedicated to supporting ModSecurity and the associated ...

Microsoft Patch Tuesday, August 2016

August 08, 2016 | SpiderLabs Researcher

Today is August's Patch and with only 9 bulletins with 27 unique CVEs it's one ...

Turning Up The Heat on IoT: TRANE Comfortlink XL850

August 07, 2016 | Jeff Kitson

The Internet of Things (IoT) continues to explode in the consumer market as ...

To Obfuscate, or not to Obfuscate

August 04, 2016 | Eric Merritt

Malware's goal is to bypass computer defenses, infect a target, and often ...

SAP ASE file creation vulnerability (CVE-2016-6196)

August 02, 2016 | Martin Rakhmanov

Recently SAP released a patch for an Adaptive Server Enterprise vulnerability ...

Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

August 01, 2016 | James Antonakos

The term "hash" is thrown around in casual IT conversation quite a bit ...

Denial of Service: A Survival Guide

August 01, 2016 | Yannick Bedard

From Anonymous style SYN flooding to Application layer denial of service, ...

Microsoft Patch Tuesday, July 2016

July 12, 2016 | SpiderLabs Researcher

July's Patch Tuesday is here and brings with it five bulletins rated Critical ...

How I Cracked a Keylogger and Ended Up in Someone's Inbox

July 01, 2016 | Rodel Mendrez

It all started from a spam campaign. Figure 1 shows a campaign we picked up ...

Malware Authors Adopt CEO Fraud Techniques

June 29, 2016 | Erwin Balunsat

CEO Fraud scams, a type of Business Email Compromise (BEC), have gained ...

CEO Fraud Scams and How to Deal With Them at the Email Gateway

June 28, 2016 | Phil Hay

Email scams known as "CEO Fraud" are very common right now. They are a type of ...

PoSeidon Adventures in Memory

June 24, 2016 | Shawn Kanady

Background

About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)

June 23, 2016 | Martin Rakhmanov

After patching set of issues reported by Trustwave SpiderLabs last month, ...

Linux Kernel ROP - Ropping your way to # (Part 2)

June 22, 2016 | Vitaly Nikolenko

Introduction In Part 1 of this tutorial, we have demonstrated how to find ...

Microsoft Patch Tuesday, June 2016

June 14, 2016 | SpiderLabs Researcher

June's Patch Tuesday doesn't hold many surprises and is similar to the past ...

Linux Kernel ROP - Ropping your way to # (Part 1)

June 10, 2016 | Vitaly Nikolenko

Kernel ROP In-kernel ROP (Return Oriented Programming) is a useful technique ...

Zero Day Auction for the Masses

June 09, 2016 | SpiderLabs Researcher

UPDATE: The seller once again lowered their price on the 6th of June to ...

Digging in the Spam Folder

June 03, 2016 | James Antonakos

Introduction Unlike spam that appears in my real-world mailbox, the numerous ...

Suzy’s Phishing Season

May 17, 2016 | Simon Kenin

Although most SWG-related blogs talk about exploit kits and malicious code, ...

Earlier Flaws Revisited: MS Office and PDF Combo Attack

May 16, 2016 | Erwin Balunsat

Recently, we came across a campaign spamming out emails containing both DOC and ...

About SAP ASE DSAM SQL Injection (CVE-2016-4013)

May 11, 2016 | Martin Rakhmanov

SAP introduced a new feature in SP02 for Adaptive Server Enterprise 16.0 that ...