Spam Down: Where is Lethic?

July 17, 2012 | Phil Hay

At Trustwave SpiderLabs we keep a close eye on spam trends. We keep and publish ...

What did the Java applet say to the SWF? Don't leave me alone in this Blackholeee!

July 16, 2012 | SpiderLabs Researcher

Last week as we were analyzing the new version of Blackhole with the new Java ...

Conference tips from your friends at Trustwave SpiderLabs

July 11, 2012 | SpiderLabs Anterior

We are quickly approaching the largest security conference week on the planet. ...

Microsoft Patch Tuesday July 2012 – TLS and Office for Mac?

July 10, 2012 | Admin

We have nine bulletins to deal with this month three of which are rated ...

How much data? Apache, Ubuntu and the Lies of the Logs.

July 03, 2012 | Ryan Jones

Forensic investigators rely heavily on log file data in order to analyse ...

Analyzing PDF Malware - Part 3C

July 03, 2012 | Ryan Merritt

Let me explain, no there is too much, let me sum up… This is part 3C in the ...

Apex Secure Coding Considerations

July 02, 2012 | Rohini Sulatycki

Apex is an on-demand language that extends the Force.com platform by providing ...

Wham Bam, the Cutwail/Blackhole Combo

July 02, 2012 | Phil Hay

Over the past few weeks we have seen a resurgence of malicious spam with links ...

Stolen Laptop Recovery via OSX Trap Partition

July 02, 2012 | Admin

My Macbook Air has 2 partitions, one that is my normal everyday partition that ...

Oops, I pwned your router- Part One

June 30, 2012 | Videoman

Embedded computing is very much about making a computer as small as possible, ...

Analyzing PDF Malware - Part 3B

June 27, 2012 | Ryan Merritt

Down that dusty trail… As the big blue letters above state, this is part 3B of ...

eHarmony Password Dump Analysis

June 26, 2012 | Mike Kelly

Unless you've been hauled up in a bunker, eating MREs and watching Doomsday ...

I Forgot Your Password

June 24, 2012 | Chris Vinecombe

I'm now going into my second year in application security, and as I learn more ...

Five E-Commerce Security Myths (Part 1)

June 23, 2012 | Marc Bown

Compromises of e-commerce websites are increasingly common. In our 2012 Global ...

Five E-Commerce Security Myths (Part 2)

June 23, 2012 | Admin

In part 1 of this series I gave an introduction into how most merchants accept ...

CVSS for Penetration Test Results (Part I)

June 22, 2012 | Tim Maletic

Trustwave has been adding support for the Common Vulnerability Scoring System ...

Internet Explorer Vulnerabilities Gone Wild

June 20, 2012 | Anat (Fox) Davidi

It's a busy time for Internet Explorer: Patch Tuesday addressed quite a few ...

Metasploit = tips, tricks, hashes and tokens

June 20, 2012 | Admin

Metasploit is one of the many tools that can be used during a penetration test, ...

[Honeypot Alert] PHP-CGI Vuln Targeted For Database Dumping

June 19, 2012 | Ryan Barnett

Thanks to my SpiderLabs Research colleague @claudijd for collaborating with ...

Using Nmap to Screenshot Web Services

June 14, 2012 | Ryan Linn

As part of Trustwave SpiderLabs network penetration testing team, I perform ...

Introducing CryptOMG

June 12, 2012 | Andrew Jordan

CryptOMG is CTF-style testbed for exploiting various flaws in cryptographic ...

Microsoft Patch Tuesday: RDP - Keep on Knockin' But You Can't Come In

June 12, 2012 | Admin

Another month, another Patch Tuesday. This one has seven bulletins three of ...

MySQL/MariaDB: Trade You a Banana for Root Access?

June 12, 2012 | Jonathan Claudius

Summary

The Return of Zuc.A and and Ancient OSX Viruses?

June 11, 2012 | Space Rogue

A few weeks ago I caught a tweet from Chris Wysopal (@WeldPond) noticing how ...

Zap(ped) into Foca(s)

June 08, 2012 | Theresa

An external penetration test isn't just about the network addresses to pwn, but ...

Analyzing PDF Malware - Part 3A

June 08, 2012 | Ryan Merritt

When we last left our heroes…

Discussions on Targeted Attacks

June 06, 2012 | Admin

Even though targeted attacks performed by groups such as LulzSec and Anonymous ...

Dynamic DAST/WAF Integration: Realtime Virtual Patching

June 05, 2012 | Ryan Barnett

At the recent OWASP AppSecDC conference, I presented on this topic. I received ...