Detecting A Surveillance State - Part 3 Infected Firmware

April 09, 2014

In this third installment of Detecting A Surveillance State blog series I will ...

Farewell to XP

April 09, 2014 | woodbusy

As Karl noted in his Patch Tuesday post, yesterday was the last day of support ...

Capturing Ghosts: Using inotify to defeat an Android DRM system

April 09, 2014 | Mike Park

Apart from our typical application penetration testing engagements, clients ...

Microsoft Patch Tuesday, April 2014

April 08, 2014

April's Microsoft Patch Tuesday is on par with the prior releases this year. ...

Microsoft Advance Notification for April 2014

April 03, 2014 | Robert Foggia

The Microsoft April security release is almost upon us with security updates ...

SpiderLabs Radio: April 3, 2014

April 03, 2014

In this episode I talk about GMail making HTTPS mandatory, a move some people ...

Microsoft Word RTF 0-Day (CVE-2014-1761)

April 03, 2014 | Trustwave SpiderLabs

A zero-day vulnerability in Microsoft Word involving the handling of the RTF ...

Stupid Spammer Tricks – Multi-Character Set Text

March 31, 2014 | Brian Bebeau

Looking to refinance your house? Install solar panels? Hey, this email about ...

Old School Code Injection in an ATM .dll

March 31, 2014 | Christophe De La Fuente

During our last ATM review engagement, we found some interesting executable ...

Wendel's Small Hacking Tricks - The Annoying NT_STATUS_INVALID_WORKSTATION.

March 31, 2014 | Wendel Guglielmetti Henrique

Since 2003 a large part of my workday has been devoted solely to hacking ...

An Intro to NetSupport Manager Scripts

March 31, 2014 | David Kirkpatrick

On a recent gig I was hit with hundreds of hosts running a service on port TCP ...

[Honeypot Alert] JCE Joomla Extension Attacks

March 26, 2014 | Ryan Barnett

Our web honeypots picked up some increased exploit attempts for an old Joomla ...

SpiderLabs Radio: March 20, 2014

March 20, 2014

In this episode we talk about the Windigo malware campaign, how a ...

Google Summer of Code (GSoC) + OWASP + ModSecurity = Awesome

March 20, 2014 | Bryant Smith

OWASP is again participating in the Google Summer of Code (GSoC) Program for ...

Detecting A Surveillance State - Part 2 Radio Frequency Exfiltration

March 18, 2014 | Robert Rowley

In the last post we reviewed a few hardware implants that may have been used by ...

ColdFusion Admin Compromise Analysis (CVE-2010-2861)

March 18, 2014 | Ryan Barnett

In a previous blog post, I provided "Method of Entry" analysis for a ColdFusion ...

SpiderLabs Radio: March 13, 2014

March 13, 2014

In this episode we talk about Microsoft Patch Tuesday providing patches for an ...

WordPress XML-RPC PingBack Vulnerability Analysis

March 12, 2014 | Ryan Barnett

There were news stories this week outlining how attackers are abusing the ...

Deep Analysis of CVE-2014-0502 – A Double Free Story

March 12, 2014 | Ben Hayak

A lot has already been said about CVE-2014-0502, the Adobe Flash Player ...

Detecting A Surveillance State - Part 1 Hardware Implants

March 11, 2014

This is the first in a series of four blog posts that will cover defenses and ...

Touchlogging Part 3 - Final Thoughts

March 11, 2014 | Neal Hindocha

This is the third and final part on the subject of Touchlogging. I do recommend ...

Microsoft Patch Tuesday, March 2014

March 11, 2014

March's Patch Tuesday includes five bulletins, two rated "Critical" and three ...

SpiderLabs Radio: March 7, 2014

March 08, 2014

In this episode we talk about a new Russian rootkit called Uroburos, another ...

Touchlogging Part 2 - Android

March 06, 2014 | Neal Hindocha

This is part two in my Touchlogging series, you can find part one here.

Bloodletting the Arms Race: Using Attacker's Techniques for Defense

March 06, 2014

Submitted by Ziv Mador and Ryan Barnett

Microsoft Advance Notification for March 2014

March 06, 2014

The Microsoft Security release for March will include patches for Windows, ...

Gamut Spambot Analysis

March 04, 2014 | Rodel Mendrez

In this blog post, we'll be describing the functionality of a spamming botnet ...

Touchlogging Part 1 - iOS

March 03, 2014 | Neal Hindocha

Although there have been numerous articles posted, I thought I would write ...