Threat Intelligence News from LevelBlue SpiderLabs September 2024
September 01, 2024
September 2024
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules
August 19, 2024 | Zachary Reichert
Stroz Friedberg identified a stealthy malware, dubbed “sedexp,” utilizing Linux ...
Threat Intelligence News from LevelBlue SpiderLabs August 2024
August 01, 2024
August 2024
Threat Intelligence News from LevelBlue SpiderLabs July 2024
July 01, 2024
July 2024
Search & Spoof: Abuse of Windows Search to Redirect to Malware
June 11, 2024 | Bernard Bautista
LevelBlue SpiderLabs has detected a sophisticated malware campaign that ...
Dissection Of Makop Ransomware Group
February 05, 2024 | Aishwarya Desai
This blog post outlines attack patterns identified across Makop ransomware ...
APT X – Process Hollowing
January 27, 2021 | Faisal Tameesh
A detailed walkthrough of the process hollowing injection technique.
Wowza Streaming Engine Manager Directory Traversal And Local File Inclusion
February 11, 2019 | Sean Melia
CVE-2018-19365: Root local file inclusion in Wowza SRM 4.7.4.01.
Breaking Randomness In The Ethereum Universe [Part 1]
June 01, 2018 | Elliot Ward
This article focuses on generating random numbers on-chain and what the ...
Reviewing Ethereum Smart Contracts
September 27, 2017 | Eric Rafaloff
This article examines the similarities between traditional code review and ...
Exploiting Padding Oracle To Gain Encryption Keys
October 26, 2015 | Georg Chalupar
Practical tricks on exploiting a padding oracle vulnerability.
SSH Weak Diffie-Hellman Group Identification Tool
August 03, 2015 | Fabian Foerg
Check SSH servers for weak Diffie-Hellman key exchange configurations.