Exploring Solidity’s Model Checker

May 13, 2020 | Eric Rafaloff

This blog post aims to be an exploration of how Solidity’s model checker works, ...

Patch Tuesday, May 2020

May 13, 2020 | Karl Sigler

May's Patch Tuesday includes patches for 111 unique CVEs. Of those CVEs 17 are ...

Work From Home: The New New and What To Do

May 11, 2020 | Ed Williams

Here at SpiderLabs, we take the security of all our clients extremely ...

A HIPAA Compliance Checklist

May 11, 2020 | Tawnya Lancaster

Five steps to ensuring the protection of patient data and ongoing risk ...

Attacking SCADA: Vulnerabilities in Schneider Electric SoMachine and M221 PLC (CVE-2017-6034 and CVE-2020-7489)

May 07, 2020 | Seok Min Lim

Introduction SCADA/OT security has been a growing concern for quite some time. ...

Combatting Social Engineering Is Not Just A Compliance Requirement

May 01, 2020 | Carl Sue

Having a well designed and tested social engineering training program for an ...

Red Team Case Study: Bypassing CloudFlare WAF for Successful OGNL Injection

April 17, 2020 | Faisal Tameesh

Bypassing CloudFlare's WAF to exploit an OGNL injection vulnerability in a red ...

Excel Malspam: Password Protected … Not!

April 17, 2020 | Diana Lopera

Early March of this year, we blogged about multiple malspam campaigns utilizing ...

COVID-19 Themed BEC Scams

April 15, 2020 | Dr. Fahim Abbasi

Business email compromise (BEC) also known as CEO fraud has undoubtedly become ...

Patch Tuesday, April 2020

April 14, 2020 | Karl Sigler

April's Patch Tuesday is here and Microsoft is patching 113 CVEs this month. ...

Slack phishing attacks using webhooks

April 14, 2020 | Ashley Graves

Background Slack is a cloud-based messaging platform that is commonly used in ...

An In-depth Look at MailTo Ransomware, Part Three of Three

April 10, 2020 | Joshua Deacon, Lloyd Macrohon

Overview In Part One of this series, we discussed how MailTo ransomware ...

An In-depth Look at MailTo Ransomware, Part Two of Three

April 08, 2020 | Joshua Deacon, Lloyd Macrohon

Overview In Part One of this series, we discussed how MailTo ransomware ...

Windows Debugging and Exploiting Part 5 SMBGhost CVE-2020-0796 Technical Review

April 03, 2020 | Bruno Oliveira

Introduction Hi everyone, how are you? I know the times are strange but we ...

The Power of Community to Fight COVID-19 Cyber Threats

April 03, 2020 | Amy Pace

Cybercriminals are taking advantage of the fear and uncertainty surrounding the ...

An In-depth Look at MailTo Ransomware, Part One of Three

March 31, 2020 | Joshua Deacon, Lloyd Macrohon

In February, an Australian transportation company called Toll Group was hit by ...

COVID-19 Malspam Activity Ramps Up

March 31, 2020 | Joshua Deacon, Homer Pacag, Rodel Mendrez, Phil Hay

Back in February, we reported on two Coronavirus-themed phishing emails. But ...

SIEM and security monitoring for Kubernetes explained

March 27, 2020 | Ashley Graves

Photo by chuttersnap on Unsplash

Would You Exchange Your Security for a Gift Card?

March 26, 2020 | Alejandro Baca, Rodel Mendrez

UPDATED March 27, 2020

Sharepoint vulnerability exploited in the wild

March 26, 2020 | Chris Doman

The CVE-2019-0604 (Sharepoint) exploit and what you need to know LevelBlue Labs ...

SMBGhost CVE-2020-0796 a Critical SMBv3 RCE Vulnerability

March 16, 2020 | Karl Sigler

Overview Last week Microsoft announced that there was a buffer overflow ...

Persistent Cross-Site Scripting, the MSSQL Way

March 12, 2020 | Jonathan Yarema

Overview If you save wide Unicode brackets (i.e. <>) into a char or varchar ...

ModSecurity Award Nominations and the Challenges of Open Source

March 12, 2020 | SpiderLabs Researcher

In the hustle and bustle of everyday work life we tend to look at the current ...

More Excel 4.0 Macro MalSpam Campaigns

March 11, 2020 | Diana Lopera

In light of the recent blog by my colleague Rodel Mendrez, we looked back at ...

Patch Tuesday March 2020

March 10, 2020 | Karl Sigler

Today marks Microsoft's March Patch Tuesday. While it may not be on the top of ...

Monster Lurking in Hidden Excel Worksheet

March 05, 2020 | Rodel Mendrez

A recent blog by Didier Steven’s showed how malicious Excel 4 macros can be ...

Windows Debugging and Exploiting Part 4: NTQuerySystemInformation

March 02, 2020 | Bruno Oliveira

Introduction Hello again! We are back with more Windows internals and it's time ...

RATs Wrapped and Hidden in PNG

February 27, 2020 | Diana Lopera

The Remote Access Tool (RAT) is one of the malware types we often encounter ...