SpiderLabs Radio for the Week of February 23, 2015
March 06, 2015
In this week's episode:
Attackers concealing malicious macros in XML files
March 06, 2015 | Rodel Mendrez
XML files are harmless text files right? Wrong! The group behind the malicious ...
[Honeypot Alert] FHS Null Byte Attack (CVE-2014-6287) Attempts to Install DDoS Malware (Iptablex)
February 25, 2015 | Ryan Barnett
Our web honeypots picked up some exploit attempts for CVE-2014-6287 which is a ...
RIG Exploit Kit – Diving Deeper into the Infrastructure
February 23, 2015
Following our previous blog post about the leaking of the RIG exploit kit's ...
SpiderLabs Radio for the Week of February 16, 2015
February 20, 2015
Unfortunately there will be no SpiderLabs Radio podcast this week. I've ...
AppDetectivePRO and DbProtect Knowledgebase Update 4.46
February 19, 2015 | Trustwave SpiderLabs
This month's update for our AppDetectivePRO and DbProtect Knowledgebase is now ...
SpiderLabs Radio for the Week of February 9, 2015
February 13, 2015
In this week's episode:
Announcing ModSecurity v2.9.0 Stable Release
February 12, 2015 | Ryan Barnett
The SpiderLabs Research - ModSecurity Team is proud to announce the stable ...
TWSL2015-001 and TWSL2015-002: New Advisories Affect IceWarp Mail Server and Magnolia CMS
February 12, 2015
The SpiderLabs team at Trustwave published two new advisories today which ...
RIG Exploit Kit Source Code Leak - The End or Just the Beginning of RIG?
February 12, 2015 | Trustwave SpiderLabs
Recently, source code for the RIG exploit kit was leaked. An independent ...
Microsoft Patch Tuesday, February 2015
February 10, 2015
Today marks Microsoft's February Patch Tuesday release and it's a pretty big ...
Stealing RubyGems API Keys during Post Exploitation
February 06, 2015 | Jonathan Claudius
Between April and May of 2013, I presented at SOURCE Boston and THOTCON and ...
Bamboo, Flexibility and Vulnerability Disclosure: Trustwave SpiderLabs’ Updated Guidelines
February 06, 2015 | Karl Sigler
Trustwave is proud to announce an updated vulnerability disclosure policy. In ...
The SpiderLabs blog will move to the Trustwave domain this week
February 04, 2015 | Trustwave SpiderLabs
In the coming days, the SpiderLabs blog will move-in to its new home within the ...
A New Zero-Day of Adobe Flash CVE-2015-0313 Exploited in the Wild
February 03, 2015 | Ben Hayak
Just yesterday Adobe announced a zero-day vulnerability in Adobe Flash Player ...
SpiderLabs Radio for the Week of January 26, 2015
February 02, 2015
In this week's episode:
GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)
January 30, 2015 | Ryan Barnett
A heap-based buffer overflow vulnerability in glibc (CVE-2015-0235) was ...
SpiderLabs Radio for the Week of January 19, 2015
January 25, 2015
In this week's episode:
A New Zero-Day of Adobe Flash is used by the Prevalent Angler Exploit Kit in the Wild
January 22, 2015
Just yesterday, security researcher Kafeine discovered a zero-day vulnerability ...
JSON Crypto Helper a Ruby-based Burp Extension for JSON Encryption/Decryption - Part III
January 21, 2015 | Christophe De La Fuente
This is the third in a three-part series about how to write a simple Ruby ...
JSON Crypto Helper a Ruby-based Burp Extension for JSON Encryption/Decryption - Part II
January 20, 2015 | Christophe De La Fuente
This is the second post in a three-part series about how to write a simple Ruby ...
JSON Crypto Helper a Ruby-based Burp Extension for JSON Encryption/Decryption - Part I
January 19, 2015 | Christophe De La Fuente
Burp Suite is one of my favorite tools when performing security assessments of ...
SpiderLabs Radio for the Week of January 12, 2015
January 18, 2015
In this week's episode we discuss Responsible Vulnerability Disclosure in the ...
Microsoft Patch Tuesday, January 2015
January 13, 2015
Happy New Year and welcome to the first Microsoft Patch Tuesday of 2015. This ...
SpiderLabs Radio for the Week of January 5, 2015
January 10, 2015
In this week's episode:
Deobfuscating Malicious Macros Using Python
January 08, 2015 | Rodel Mendrez
Over the past few weeks, we've observed cybercriminals spamming users, ...
No Country For Old Vulnerabilities
December 31, 2014 | Robert Rowley
Finding a common cross-site scripting vulnerability in Cisco's new IOS Software ...
Building my own personal password cracking box
December 31, 2014 | Wendel Guglielmetti Henrique
Since 2003, I've spent a majority of my workdays hacking systems. I've ...