Smuggler - An interactive 802.11 wireless shell without the need for authentication or association

November 03, 2014

I've always been fascinated by wireless communications. The ability to launch ...

SpiderLabs Radio for the week of October 27, 2014

November 01, 2014

In this episode:

Setting HoneyTraps with ModSecurity: Adding Fake Cookies

October 31, 2014 | Ryan Barnett

This blog post continues with the topic of setting " HoneyTraps" within your ...

Reflected File Download - A New Web Attack Vector

October 30, 2014 | Oren Hafif

PLEASE NOTE: As promised, I've published a full white paper that is now ...

Bitcoin Transaction Malleability Theory in Practice – Ruxcon Australia 2014

October 30, 2014 | Rami Kogan

Two weeks ago we gave a talk at the Ruxcon 10 conference in Melbourne, ...

Hacking a Reporter: UK Edition

October 28, 2014 | SpiderLabs Researcher

Over the summer, a U.K. journalist asked the Trustwave SpiderLabs team to ...

SpiderLabs Radio: October 22, 2014

October 25, 2014

In this episode:

Powerpoint Vulnerability (CVE-2014-4114) used in Malicious Spam

October 23, 2014

Following last week's announcement of a zero-day vulnerability for PowerPoint ...

Spam Campaign Taking Advantage of Ebola Scare May Lead To Malware Infections

October 22, 2014 | Rodel Mendrez

Cybercriminals have inevitably taken advantage of the publicization of the ...

SpiderLabs Radio: October 16, 2014

October 18, 2014

In this episode we'll be talking about the zero days patched by Microsoft's ...

Jailbreak Detection Methods

October 15, 2014

This post concludes our three-part series about mobile security. Today's post ...

Exploring and Exploiting iOS Web Browsers

October 14, 2014 | SpiderLabs Researcher

Today we begin a three-post series about mobile security. We start with a ...

Microsoft Patch Tuesday, October 2014

October 14, 2014

Today is the October Microsoft Patch Tuesday, and it addresses eight separate ...

Executing Apps on Jailbroken Devices

October 14, 2014 | SpiderLabs Researcher

This post is part two of a three-part series about mobile security. Today's ...

SpiderLabs Radio: October 9, 2014

October 11, 2014

In this episode:

Microsoft Advance Notification for October 2014

October 09, 2014 | Robert Foggia

On Tuesday, October 14, Microsoft will publish their newest security update. ...

SpiderLabs Radio: October 2, 2014

October 03, 2014

In this episode:

Shellshock a Week Later: What We Have Seen

October 01, 2014 | Ryan Barnett

Trustwave, like most other information security firms, has been busy ...

SpiderLabs Radio: September 25, 2014

September 26, 2014

The SpiderLabs Radio podcast is on hiatus this week as we absorb all of the ...

Identify Crimeware Strains with Edit Distance

September 22, 2014 | Jonathan Claudius

When trying to identify crimeware/malware, it's a good idea to design a ...

Cracking IKE Mission:Improbable (Part3)

September 22, 2014 | Daniel Turner

Introduction

SpiderLabs Radio: September 18, 2014

September 19, 2014

In this episode:

Leveraging LFI To Get Full Compromise On WordPress Sites

September 16, 2014 | Robert Rowley

In this post I will discuss how a serious but mostly ignored vulnerability can ...

CVE-2014-6283: Privilege Escalation Vulnerability and Potential Remote Code Execution in SAP Adaptive Server Enterprise

September 16, 2014 | Martin Rakhmanov

On May 12, 2014, SAP published updates to Adaptive Server Enterprise versions ...

[Honeypot Alert] New Bot Malware (BoSSaBoTv2) Attacking Web Servers Discovered

September 15, 2014 | Ryan Barnett

Our web honeypots picked up some interesting attack traffic. The initial web ...

SpiderLabs Radio: September 11, 2014

September 13, 2014

In this episode I talk about the non-existent massive leak of 5 million Google ...

Indicators of Compromise: A Discussion with Karl Sigler

September 12, 2014 | Trustwave SpiderLabs

Head over to the Trustwave blog for a video discussion about indicators of ...

SpiderLabs Radio: September 4, 2014

September 12, 2014

In this episode: