Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: SpiderLabs Blog from Trustwave

Malware Authors Adopt CEO Fraud Techniques

Posted on June 29, 2016 by SpiderLabs Blog from Trustwave

CEO Fraud scams, a type of Business Email Compromise (BEC), have gained popularity among scammers recently. These scams use the power of the CEO’s name to try and elicit a response from a targeted employee of an organization. For more…
Continue reading Malware Authors Adopt CEO Fraud Techniques→

Posted in Uncategorized

CEO Fraud Scams and How to Deal With Them at the Gateway

Posted on June 28, 2016 by SpiderLabs Blog from Trustwave

Email scams known as “CEO Fraud” are very common right now. They are a type of “Business Email Compromise” (BEC). There have been numerous recent cases reported in the media, and we too, are seeing many reports by our customers….
Continue reading CEO Fraud Scams and How to Deal With Them at the Gateway→

Posted in Uncategorized

CEO Fraud Scams and How to Deal With Them at the Email Gateway

Posted on June 28, 2016 by SpiderLabs Blog from Trustwave

Email scams known as “CEO Fraud” are very common right now. They are a type of “Business Email Compromise” (BEC). There have been numerous recent cases reported in the media, and we too, are seeing many reports by our customers….
Continue reading CEO Fraud Scams and How to Deal With Them at the Email Gateway→

Posted in Uncategorized

PoSeidon Adventures in Memory

Posted on June 24, 2016 by SpiderLabs Blog from Trustwave

Background As an Incident Responder I get the unique opportunity to see a lot of malware and in most cases that I investigate, the malware is of the card number stealing type. To be more specific, I deal with a…
Continue reading PoSeidon Adventures in Memory→

Posted in Uncategorized

PoSeidon Adventures in Memory

Posted on June 24, 2016 by SpiderLabs Blog from Trustwave

Background As an Incident Responder I get the unique opportunity to see a lot of malware and in most cases that I investigate, the malware is of the card number stealing type. To be more specific, I deal with a…
Continue reading PoSeidon Adventures in Memory→

Posted in Uncategorized

About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)

Posted on June 23, 2016 by SpiderLabs Blog from Trustwave

After patching set of issues reported by Trustwave SpiderLabs last month, Lenovo released another version of its Lenovo Solution Center software to address new security holes. Specifically, we at Trustwave SpiderLabs found that the new version (3.3.002… Continue reading About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)→

Posted in Uncategorized

About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)

Posted on June 23, 2016 by SpiderLabs Blog from Trustwave

After patching set of issues reported by Trustwave SpiderLabs last month, Lenovo released another version of its Lenovo Solution Center software to address new security holes. Specifically, we at Trustwave SpiderLabs found that the new version (3.3.002… Continue reading About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)→

Posted in Uncategorized

About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)

Posted on June 23, 2016 by SpiderLabs Blog from Trustwave

After patching set of issues reported by Trustwave SpiderLabs last month, Lenovo released another version of its Lenovo Solution Center software to address new security holes. Specifically, we at Trustwave SpiderLabs found that the new version (3.3.002… Continue reading About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249)→

Posted in Uncategorized

Linux Kernel ROP – Ropping your way to # (Part 2)

Posted on June 22, 2016 by SpiderLabs Blog from Trustwave

Introduction In Part 1 of this tutorial, we have demonstrated how to find useful ROP gadgets and build a privilege escalation ROP chain for our test system (3.13.0-32 kernel – Ubuntu 12.04.5 LTS). We have also developed a vulnerable kernel…
Continue reading Linux Kernel ROP – Ropping your way to # (Part 2)→

Posted in Uncategorized

Linux Kernel ROP – Ropping your way to # (Part 2)

Posted on June 22, 2016 by SpiderLabs Blog from Trustwave

Introduction In Part 1 of this tutorial, we have demonstrated how to find useful ROP gadgets and build a privilege escalation ROP chain for our test system (3.13.0-32 kernel – Ubuntu 12.04.5 LTS). We have also developed a vulnerable kernel…
Continue reading Linux Kernel ROP – Ropping your way to # (Part 2)→

Posted in Uncategorized

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Report: OpenAI Wants to Break Up With Apple Over Unfruitful Siri Integration May 15, 2026
  • Samsung vs. Motorola in 2026: I’ve tested enough phones from both to know my winner May 15, 2026
  • Bose Lifestyle Ultra Speaker vs. Sonos Era 100: I compared both models, and here’s the winner May 15, 2026
  • This new Claude skill saves you from bad contracts – and costs less than a lawyer May 15, 2026
  • Monitor not displaying full screen in Windows 11 May 15, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up