D-Link: Multiple Security Vulnerabilities Leading to RCE
December 17, 2020 | Harold Zang
On the 30th of October, D-Link published a support announcement and released a ...
Scamming from the Cloud
December 16, 2020 | Dr. Fahim Abbasi
Cybercriminals are leveraging reputable cloud services to relay scam email ...
Magic Home Pro Mobile Application Authentication Bypass (CVE-2020-27199)
December 15, 2020 | Victor Hanna
Overview With the prevalence of IoT devices flooding the mainstream ...
Trustwave’s Action Response To the FireEye Data Breach
December 11, 2020 | Trustwave SpiderLabs
Update With the new information and developments released by FireEye, we have ...
Insecure Communication in WinZip 24 Could Lead to Malware
December 10, 2020 | Martin Rakhmanov
Overview During observation of WinZip 24 network communications, I've noticed ...
Patch Tuesday, December 2020
December 08, 2020 | Karl Sigler
December's Patch Tuesday is here and, typical for the end of the year, it's a ...
Attacking SCADA Part III: Hardcoded Salt in Schneider Electric EcoStruxure Machine Expert (CVE-2020-28214)
December 08, 2020 | Seok Min Lim
This is part three of our Schneider Electric series. You can read part one here ...
GO SMS Pro Vulnerable to File Theft: Part 2
December 01, 2020 | Karl Sigler
Last week we released an advisory about an SMS app called GO SMS Pro. Media ...
GO SMS Pro Vulnerable to Media File Theft
November 19, 2020 | Richard Tan
The GO SMS Pro application is a popular messenger app with over 100 million ...
See ya in S3!
November 14, 2020 | Mary Braden Murphy
Stroz Friedberg has unique insight on how attackers attempt to cover their ...
Attacking SCADA Part II: Vulnerabilities in Schneider Electric EcoStruxure Machine Expert and M221 PLC
November 10, 2020 | Seok Min Lim
This is part 2 of a two-part series. You can read part 1 here.
GoldenSpy Chapter 5 : Multiple GoldenSpy Uninstaller Variants Discovered
October 22, 2020 | Reegun Jayapaul
Summary: Trustwave identified a significant malicious campaign on mandatory tax ...
Bad Neighbors Can Break Windows (CVE-2020-16898)
October 21, 2020 | Shrijin Srinivasan
On October 13th, 2020, Microsoft released a patch for a critical vulnerability ...
Massive US Voters and Consumers Databases Circulate Among Hackers
October 21, 2020 | Ziv Mador
Voting in the U.S. elections started recently and there is a real concern over ...
GoldenSpy Chapter 4: GoldenHelper Malware Embedded in Official Golden Tax Software
October 15, 2020 | Brian Hussey
Directly preceding GoldenSpy, another malware family was used to covertly ...
Patch Tuesday, October 2020
October 14, 2020 | Karl Sigler
October's Patch Tuesday is upon us and with it comes patches for 102 CVEs. This ...
Into Defray
October 08, 2020 | Daniel Spicer
Stroz Friedberg provides a look into the techniques and patterns of the ...
Evasive URLs in Spam: Part 2
October 01, 2020 | Diana Lopera
A URL can be completely valid, yet still misleading. In this blog, we will ...
Network Detection for ZeroLogon CVE-2020-1472
September 30, 2020 | Bryant Smith
ZeroLogon has quickly become popular and well known because of multiple proofs ...
SAP ASE Information Leaks: CVE-2020-6295 and CVE-2020-6317
September 24, 2020 | Martin Rakhmanov
Introduction Today I'd like to discuss two information disclosure ...
Hijacking a Domain Controller with Netlogon RPC aka Zerologon: CVE-2020-1472
September 17, 2020 | Jason Villaluna, Shrijin Srinivasan
On September 14th, researchers at security firm Secura published a white paper ...
Evasive URLs in Spam
September 17, 2020 | Dr. Fahim Abbasi
This post is part one of a two part series. You can read part two here.
ModSecurity Regular Expressions and Disputed CVE-2020-15598
September 14, 2020 | SpiderLabs Researcher
ModSecurity is an open-source Web Application Firewall (WAF) engine maintained ...
Blackhole Exploit Kit v2
September 14, 2020 | Daniel Chechik
A few days ago a new version of THE most common exploit kit was released. ...
RATs and Spam: The Node.JS QRAT
August 24, 2020 | Diana Lopera
The Qua or Quaverse Remote Access Trojan (QRAT) is a Java-based RAT that can be ...
SpiderLabs Capture the Flag 2020 Results
August 21, 2020 | Radoslaw Zdonczyk, Charles Hamilton
From SSRF to Compromise: Case Study
August 20, 2020 | Liam Somerville
Overview I think every penetration tester has a story about the one that got ...
IBM Db2 Shared Memory Vulnerability (CVE-2020-4414)
August 20, 2020 | Martin Rakhmanov
I’ve recently blogged about a shared memory vulnerability in Cisco WebEx ...