Showing 16 results for: February 2014 ×

SpiderLabs Radio: February 27, 2014

In this episode we talk about the Apple "gotofail" SSL vulnerability, SEA is still around and hasn't stopped hacking, the source code from some Android malware gets leaked publicly, a student gets caught mining Dogecoins on university computers, Bitcoin exchange...

Look What I Found: Pony is After Your Coins!

In our previous episode of "Look What I Found" we detailed our discovery of a humongous instance of a Pony botnet controller that stole credentials for approximately two million websites, social networks, e-mails and other types of accounts. We recently...

SpiderLabs Radio: February 20, 2014

In this episode we look at the new Linksys worm dubbed TheMoon, two new exploits target a 0 day vulnerability in Internet Explorer, a new Zeus variant hides using stegonagraphy, and I talk to Trustwave Spiderlabs' Ziv Mador and Ryan...

Internet Explorer Zero Day: CVE-2014-0322

Recently, several security vendors reported about a new IE 0day which affects version 9 and 10. The attackers targeted the U.S. Veterans of Foreign Wars website (vfw.org) with an injected iframe which contained a previously unknown exploit for IE. Below...

Responder 2.0 - Owning Windows Networks part 3

Introduction: The power and flexibility of Responder has grown significantly over the past year. Responder is a powerful and easy-to-use tool for penetration testers looking to highlight and exploit weaknesses in a number of popular default network configurations. In this...

Wait a minute... that’s not a real JPG!

When attackers compromise a website and want to harvest credit cards, they need to either find where the data is stored or capture the data in transit. This blog post shows how identifying files with false file signatures can uncover...

SpiderLabs Radio: February 13, 2014

In this episode we look at Facebook's open-sourcing of the Android crypto API "Conceal", more POS malware in JackPOS, Microsoft retires MD5, hacking cars, the biggest DDoS to date, mobile security and APT campaign "the Mask" is revealed. links from...

JackPOS – The House Always Wins

A new point of sale (POS) malware family could be a jackpot for credit card thieves. I recently learned of a new POS malware family, dubbed JackPOS. This certainly has been a busy 2014 with regards to POS malware. During...

CVE-2014-0050: Exploit with Boundaries, Loops without Boundaries

In this article I will discuss CVE-2014-0050: Apache Commons FileUpload and Apache Tomcat Denial-of-Service in detail. The article reviews the vulnerability's technical aspects in depth and includes recommendations that can help administrators defend from future exploitation of this security issue....

Microsoft Patch Tuesday, February 2014

February's Patch Tuesday is back to business as usual after the light January release. This month's release includes seven bulletins, four of which are rated "Critical". The other three are rated "Important". As if making up for lost time, Internet...

The Keystone Rocks - Foundation Chips of Pentesting Tips Part 1

The knowledgebase of a penetration tester can be broadly split into two categories: Relevant knowledge and Meaningless knowledge. These can also be thought of as Non-persistent knowledge and Persistent knowledge respectively. Although, I should highlight that these alternative labels for...

SpiderLabs Radio: February 7, 2014

In this episode I talk about a new Adobe zero day in Flash Player, the Chewbacca POS malware, a new Zeus delivery mechanism, a new iFrame injection technique using PNG image files and a new tool for learning mobile security...

Microsoft Advance Notification for February 2014

***Update as of Monday, February 10, 2014*** Since our post last Thursday, Microsoft has released additional details about tomorrow’s bulletins. Those updates include: - Added a "Critical" Internet Explorer bulletin requiring a restart. - Added a "Critical" Windows bulletin affecting...