Threat Intelligence News from LevelBlue SpiderLabs September 2024

September 01, 2024

September 2024

Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules

August 19, 2024 | Zachary Reichert

Stroz Friedberg identified a stealthy malware, dubbed “sedexp,” utilizing Linux ...

Threat Intelligence News from LevelBlue SpiderLabs August 2024

August 01, 2024

August 2024

Threat Intelligence News from LevelBlue SpiderLabs July 2024

July 01, 2024

July 2024

Search & Spoof: Abuse of Windows Search to Redirect to Malware

June 11, 2024 | Bernard Bautista

LevelBlue SpiderLabs has detected a sophisticated malware campaign that ...

Dissection Of Makop Ransomware Group

February 05, 2024 | Aishwarya Desai

This blog post outlines attack patterns identified across Makop ransomware ...

APT X – Process Hollowing

January 27, 2021 | Faisal Tameesh

A detailed walkthrough of the process hollowing injection technique.

Wowza Streaming Engine Manager Directory Traversal And Local File Inclusion

February 11, 2019 | Sean Melia

CVE-2018-19365: Root local file inclusion in Wowza SRM 4.7.4.01.

Breaking Randomness In The Ethereum Universe [Part 1]

June 01, 2018 | Elliot Ward

This article focuses on generating random numbers on-chain and what the ...

Reviewing Ethereum Smart Contracts

September 27, 2017 | Eric Rafaloff

This article examines the similarities between traditional code review and ...

Exploiting Padding Oracle To Gain Encryption Keys

October 26, 2015 | Georg Chalupar

Practical tricks on exploiting a padding oracle vulnerability.

SSH Weak Diffie-Hellman Group Identification Tool

August 03, 2015 | Fabian Foerg

Check SSH servers for weak Diffie-Hellman key exchange configurations.