The Power of Community to Fight COVID-19 Cyber Threats
April 03, 2020 | Amy Pace
Cybercriminals are taking advantage of the fear and uncertainty surrounding the ...
An In-depth Look at MailTo Ransomware, Part One of Three
March 31, 2020 | Joshua Deacon, Lloyd Macrohon
In February, an Australian transportation company called Toll Group was hit by ...
COVID-19 Malspam Activity Ramps Up
March 31, 2020 | Joshua Deacon, Homer Pacag, Rodel Mendrez, Phil Hay
Back in February, we reported on two Coronavirus-themed phishing emails. But ...
SIEM and security monitoring for Kubernetes explained
March 27, 2020 | Ashley Graves
Photo by chuttersnap on Unsplash
Would You Exchange Your Security for a Gift Card?
March 26, 2020 | Alejandro Baca, Rodel Mendrez
UPDATED March 27, 2020
Sharepoint vulnerability exploited in the wild
March 26, 2020 | Chris Doman
The CVE-2019-0604 (Sharepoint) exploit and what you need to know LevelBlue Labs ...
SMBGhost CVE-2020-0796 a Critical SMBv3 RCE Vulnerability
March 16, 2020 | Karl Sigler
Overview Last week Microsoft announced that there was a buffer overflow ...
Persistent Cross-Site Scripting, the MSSQL Way
March 12, 2020 | Jonathan Yarema
Overview If you save wide Unicode brackets (i.e. <>) into a char or varchar ...
ModSecurity Award Nominations and the Challenges of Open Source
March 12, 2020 | SpiderLabs Researcher
In the hustle and bustle of everyday work life we tend to look at the current ...
More Excel 4.0 Macro MalSpam Campaigns
March 11, 2020 | Diana Lopera
In light of the recent blog by my colleague Rodel Mendrez, we looked back at ...
Patch Tuesday March 2020
March 10, 2020 | Karl Sigler
Today marks Microsoft's March Patch Tuesday. While it may not be on the top of ...
Monster Lurking in Hidden Excel Worksheet
March 05, 2020 | Rodel Mendrez
A recent blog by Didier Steven’s showed how malicious Excel 4 macros can be ...
Windows Debugging and Exploiting Part 4: NTQuerySystemInformation
March 02, 2020 | Bruno Oliveira
Introduction Hello again! We are back with more Windows internals and it's time ...
RATs Wrapped and Hidden in PNG
February 27, 2020 | Diana Lopera
The Remote Access Tool (RAT) is one of the malware types we often encounter ...
Multiple Phishing Attacks Discovered Using the Coronavirus Theme
February 13, 2020 | Homer Pacag
It’s out there in the newspaper, social media, and television headlines. The ...
Patch Tuesday February 2020
February 11, 2020 | Karl Sigler
February's Patch Tuesday is here and brings with it patches for 98 CVEs. These ...
Reversing (and Recreating) Cryptographic Secrets Found in .NET Assemblies Using Python
February 04, 2020 | Tom Neaves
Picture the scene - you’re on a penetration test, somehow you’ve got hold of a ...
Why should you use correlation rules on top of traditional signatures?
February 04, 2020 | Javier Ruiz
The LevelBlue Labs team is in charge of writing correlation rules and releasing ...
Microsoft Internet Explorer Remote Code Execution 0-Day (CVE-2020-0674)
January 21, 2020 | SpiderLabs Researcher
2020 is not starting out quietly for Microsoft, it seems. After the first Patch ...
ModSecurity Denial of Service Details - CVE-2019-19886
January 20, 2020 | Trustwave SpiderLabs
ModSecurity is an open-source WAF engine maintained by Trustwave. As a lively ...
Windows CryptoAPI Spoofing Vulnerability - CVE-2020-0601
January 17, 2020 | Karl Sigler
One of the most notable vulnerabilities patched during Microsoft's first Patch ...
Patch Tuesday, January 2020
January 14, 2020 | Karl Sigler
Happy 2020! Microsoft is helping you celebrate the new decade with patches for ...
ModSecurity v3.0.4 Released!
January 14, 2020 | SpiderLabs Researcher
It is a pleasure to announce the release of ModSecurity version 3.0.4 ...
Windows Debugging & Exploiting Part 3: WinDBG Time Travel Debugging
January 09, 2020 | Bruno Oliveira
Introduction Hi, my fellow friends! How are you? Hopefully, you had a terrific ...
Technical Analysis of an Active Cryptomining Worm by LevelBlue Labs
January 09, 2020 | Fernando Dominguez
This blog post provides an overview of the LevelBlue Labs™ technical analysis ...
Using the InterPlanetary File System For Offensive Operations
January 02, 2020 | Stephan Borosh
Introduction In this blog post, I intend to provide some insight into using the ...
Leveraging Disk Imaging Tools to Deliver RATs
December 23, 2019 | Joshua Deacon, Diana Lopera, Fahim Abbasi
This year we observed a notable uptick in disc imaging software (like .ISO) ...
Undressing the REvil
December 20, 2019 | Rodel Mendrez
Contributors: Lloyd Macrohon and Rodel Mendrez