Joomla 0-Day Exploited In the Wild (CVE-2015-8562)

December 18, 2015 | Assi Barak

A recent new 0-day in Joomla discovered by Sucuri (Sucuri Blog) has drawn a lot ...

Defender for IoT’s Firmware Analysis Tool is Exceptional

December 18, 2015 | David Broggy

One of my "pastimes," if you will, is to check out the features of various ...

Mom Spies a Hack

December 15, 2015 | Jonathan Yarema

Have you ever wondered if all that informal training you do with your friends ...

Microsoft Patch Tuesday, December 2015

December 08, 2015

The December Microsoft Path Tuesday is upon us and it does not bring any happy ...

Another Brick in the FrameworkPoS

December 07, 2015 | Eric Merritt

Introduction FrameworkPoS is a well-documented family of malware that targets ...

New Memory Scraping Technique in Cherry Picker PoS Malware

November 17, 2015 | Eric Merritt

Introduction Working primarily with point of sale malware, we regularly see the ...

Shining the Spotlight on Cherry Picker PoS Malware

November 16, 2015 | Eric Merritt

Introduction For the last five years Trustwave has been monitoring a threat ...

Microsoft Patch Tuesday, November 2015

November 10, 2015

November's Patch Tuesday marks a return to business as usual. Where October was ...

BOM Obfuscation in Spam

November 10, 2015 | Phil Hay

Spammers try all sorts of tricks to obfuscate, including trying to obfuscate ...

SpiderLabs Radio for the Week of November 2, 2015 - Final Episode

November 08, 2015

In this week's episode:

Oracle Database 11.2 SQLi in XML index statistics processing (CVE-2015-4900)

November 06, 2015 | Martin Rakhmanov

In the October 2015 'Critical Patch Update' Oracle fixed a flaw in XML index ...

Exploiting Padding Oracle To Gain Encryption Keys

October 26, 2015 | Georg Chalupar

Practical tricks on exploiting a padding oracle vulnerability.

About Lenovo System Update Vulnerabilities and CVE-2015-6971

October 26, 2015 | Martin Rakhmanov

Over the past seven months, a number of vulnerabilities in Lenovo System Update ...

SpiderLabs Radio for the Week of October 19, 2015

October 25, 2015

Two separate SpiderLabs vulnerabilities released:

Joomla SQL Injection Vulnerability Exploit Results in Full Administrative Access

October 22, 2015 | Asaf Orpani

Trustwave SpiderLabs researcher Asaf Orpani has discovered an SQL injection ...

How To Decrypt Ruby SSL Communications with Wireshark

October 19, 2015

Debugging a program that communicates with a remote endpoint usually involves ...

AppDetectivePRO and DbProtect Knowledgebase Update 4.54

October 13, 2015 | SpiderLabs Researcher

This month's update for our AppDetectivePRO and DbProtect Knowledgebase is now ...

Zero-day in Magmi database client for popular e-commerce platform Magento targeted in the wild

October 13, 2015 | Assi Barak

We've observed HTTP requests associated with an exploit attempt on the Magento ...

Microsoft Patch Tuesday for October 2015

October 13, 2015

October's Patch Tuesday is upon us and with only six bulletins, it's one of ...

SpiderLabs Radio for the Week of September 28, 2015

October 05, 2015

In this week's episode:

Jumping through the hoops: multi-stage malicious PDF spam

September 30, 2015 | Phil Hay

We've recently encountered a number of malicious spam messages with PDFs ...

Quaverse RAT: Remote-Access-as-a-Service

September 23, 2015 | Rodel Mendrez

***UPDATE as of September 28, 2015 - see the bottom of this post for removal ...

HOW TO: Setting up Encrypted Communications Channels in Oracle Database

September 22, 2015 | Martin Rakhmanov

In this article, I will explain how to set up an encrypted communications ...

SpiderLabs Radio for the Week of September 14, 2015

September 21, 2015

In this week's episode:

Microsoft Patch Tuesday, September 2015

September 08, 2015

Today marks Patch Tuesday for September and this month brings with it 12 ...

Lessons in Spam JavaScript Obfuscation Layers

September 08, 2015 | Brian Bebeau

Spammers seem to be adding layers of obfuscation to their malware attachments ...

SpiderLabs Radio for the Week of August 31, 2015

September 06, 2015

In this week's episode:

About Two SAP Adaptive Server Enterprise (ASE) Extended Procedure Subsystem Vulnerabilities

September 03, 2015

Recently SAP patched two important security issues in Adaptive Server ...