Showing 9 results for: July 2015 ×

Tsar Team Microsoft Office Zero Day CVE-2015-2424

After the publication of Flash and IE zero days following the Hacking Team leak, researchers have discovered the use of another zero-day vulnerability by the Tsar Team sometimes referred to as the APT28 and Operation Pawn Storm. iSIGHT Partners discovered...

SpiderLabs Radio for the Week of July 13, 2015

In this week's episode: Microsoft's July Patch Tuesday and Windows Server 2003 EOL Darkode gets taken down Listen to this and archived episodes on Trustwave SpiderLabs Radio or in iTunes. Or you can download the MP3 file directly here. Or...

Microsoft Patch Tuesday July 2015

July's Patch Tuesday is here and brings with it a rather large 14 bulletins with 4 Critical and 10 Important rated patches. All combined this month's release patches 59 vulnerabilities 29 of which are in the old stalwart Internet Explorer....

SpiderLabs Radio for the Week of Jul 6, 2015

In this week's episode we talk about the Hacking Team getting hacked. Listen to this and archived episodes on Trustwave SpiderLabs Radio or in iTunes. Or you can download the MP3 file directly here. Or listen right from your browser...

A Flash Exploit (CVE-2015-5119) From the Hacking Team Leak

***Update July 12, 2015--It was recently discovered that Hacking Team possessed an additional zero-day exploit for Adobe Flash--CVE-2015-5122. CVE-2015-5122 was patched by Adobe on July 8, 2015. While a different exploit than CVE-2015-5119 discussed below, Trustwave SWG customers are also...

AppDetectivePRO and DbProtect Knowledgebase Update 4.51

This month's update for our AppDetectivePRO and DbProtect Knowledgebase is now available. Knowledgebase version 4.51 includes new and/or updated checks for vulnerabilities in Oracle Database and MySQL. NOTE: AppDetectivePRO users MUST upgrade to version 8.5.1 prior to installing Knowledgebase update...

Malvertisement – A Nuclear EK Tale

Over the past couple of years delivering malware via advertisements, or "malvertisement," has become one of the most popular methods of distribution for exploit kits. Like most trends in the world of Internet security, the longer it endures - the...