Threat Intelligence News from LevelBlue SpiderLabs January 2026

January 06, 2026

Hunter

A 2025 Threat Trends Analysis

December 22, 2025 | Andrea Martinez and Peter Connolly

As 2025 winds down and cruises into the holiday season, it’s a good time to ...

LevelBlue SpiderLabs: SQL Injection in Orkes Conductor: CVE-2025-66387

December 18, 2025 | Tim Stamopoulos

LevelBlue SpiderLabs has discovered a vulnerability in the Orkes Conductor ...

Threat Intelligence News from LevelBlue SpiderLabs December 2025

December 12, 2025

LevelBlue SpiderLabs is the threat intelligence unit of LevelBlue and includes ...

Notepad++ DLL Hijacking (CVE-2025-56383): CVSS 8.4 or CVSS 0.0?

October 03, 2025

A vulnerability on a popular source-code editor has been recently released ...

Threat Intelligence News from LevelBlue SpiderLabs, October 2025

October 01, 2025

October 2025

Tracing Blind Eagle to Proton66

June 27, 2025 | Serhii Melnyk

Trustwave SpiderLabs has assessed with high confidence that the threat group ...

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

March 20, 2025 | Karl Biron

In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your ...

Email Bombing: Why You Need to be Concerned

December 18, 2024 | Phil Hay

Over the last few months, the topic of email bombing has been brought to our ...

Lessons from a Honeypot with US Citizens’ Data

November 13, 2024 | Radoslaw Zdonczyk and Nikita Kazymirskyi

Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team ...

How Threat Actors Conduct Election Interference Operations: An Overview

October 18, 2024 | Pauline Bolaños

The major headlines that arose from the three most recent US presidential ...

Exploring an Experimental Windows Kernel Rootkit in Rust

September 09, 2024

Around two years ago, memN0ps took the initiative to create one of the first ...

Hypervisor Development in Rust for Security Researchers (Part 1)

September 06, 2024

In the ever-evolving field of information security, curiosity and continuous ...

Search & Spoof: Abuse of Windows Search to Redirect to Malware

June 11, 2024 | Bernard Bautista

LevelBlue SpiderLabs has detected a sophisticated malware campaign that ...

Dissection Of Makop Ransomware Group

February 05, 2024 | Aishwarya Desai

This blog post outlines attack patterns identified across Makop ransomware ...

APT X – Process Hollowing

January 27, 2021 | Faisal Tameesh

A detailed walkthrough of the process hollowing injection technique.

Wowza Streaming Engine Manager Directory Traversal And Local File Inclusion

February 11, 2019 | Sean Melia

CVE-2018-19365: Root local file inclusion in Wowza SRM 4.7.4.01.

Breaking Randomness In The Ethereum Universe [Part 1]

June 01, 2018 | Elliot Ward

This article focuses on generating random numbers on-chain and what the ...

Reviewing Ethereum Smart Contracts

September 27, 2017 | Eric Rafaloff

This article examines the similarities between traditional code review and ...

Exploiting Padding Oracle To Gain Encryption Keys

October 26, 2015 | Georg Chalupar

Practical tricks on exploiting a padding oracle vulnerability.

SSH Weak Diffie-Hellman Group Identification Tool

August 03, 2015 | Fabian Foerg

Check SSH servers for weak Diffie-Hellman key exchange configurations.