Showing 6 results for: 2011 ×Incident Response ×

Analyzing PDF Malware - Part 1

Background I'd like to think that security awareness has gotten to the point where the average end user thinks twice before opening an 'exe' file sent to them as an email attachment. I like to think that. I really do....

Morto: More than Meets the Eye

There's been a lot of talk the past week or so about Morto. For those unfamiliar or unaware, Morto is a tricky little worm which looks for instances of Remote Desktop exposed online with weak Administrator passwords. How weak you...

Analyzing Malware Hollow Processes

The Malware Analyst's Cookbook is a great book. In it the authors talked about an interesting technique they called 'process hollowing'. When I read about it, I was intrigued and played around a bit with the examples from the book....

Trustwave's Global Security Report 2011- Now Available

Today we released Trustwave's Global Security Report 2011 (short registration required). This marks the 4th year that we have published compromise trends and the 2nd year we have include an expanded data-set that also covers insights from both our penetration...

Trustwave's Global Security Report 2011: Web Application Risks

Yesterday, we released Trustwave's Global Security Report 2011 (short registration required). This report encompasses data gathered by the SpiderLabs Team during 220 forensic investigations and over 2,300 manual penetration tests. Notice the word "manual" was highlighted right? That means that...