<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <atom:link href="https://www.trustwave.com/en-us/rss/spiderlabs-blog/" rel="self" type="application/rss+xml" />
        <title>SpiderLabs Blog from Trustwave</title>
        <link>https://www.trustwave.com/en-us/</link>
        <description>SpiderLabs is Trustwave’s elite team of ethical hackers, forensic investigators and security researchers.</description>
        <pubDate>Fri, 07 Dec 2018 19:02:41 +0000</pubDate>
        <lastBuildDate>Fri, 07 Dec 2018 19:02:41 +0000</lastBuildDate>
        <language>en-us</language>

                <item>
                    <title>ModSecurity v3.0.3: What To Expect</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-v303-what-to-expect/</link>
                    <description>At precisely 155 commits ahead of the latest version, ModSecurity version 3.0.3 contains a number of improvements and features to enhance the ModSecurity experience. In this blog post, we&#39;ll explain some of the new capabilities in the latest release. Better...</description>
                    <pubDate>Mon, 12 Nov 2018 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-21011</guid>
                </item>
                <item>
                    <title>ModSecurity Version 3.0 Announcement</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-version-30-announcement/</link>
                    <description>libModSecurity aka ModSecurity version 3.0 is out there. libModSecurity starts a new era in terms of ModSecurity extensibility. The modular architecture provides flexibility to extend ModSecurity core with scripting languages and from scripting languages. Facilitating work such as: UI integration,...
</description>
                    <pubDate>Wed, 10 Jan 2018 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15753</guid>
                </item>
                <item>
                    <title>ModSecurity Web Application Firewall - Commercial Rules Update(4)</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-web-application-firewall-commercial-rules-update-4/</link>
                    <description>We have recently released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and above. These rules&#39; purpose is to protect against new emerging attacks that target vulnerabilities in public software. For this release we are highlighting virtual patches...
</description>
                    <pubDate>Wed, 18 Oct 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15773</guid>
                </item>
                <item>
                    <title>ModSecurity Web Application Firewall - Commercial Rules Update(3)</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-web-application-firewall-commercial-rules-update-3/</link>
                    <description>We have released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and above. These rules&#39; purpose is to protect against new emerging attacks that target vulnerabilities in public software. For this release we would like to highlight the...
</description>
                    <pubDate>Thu, 14 Sep 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15783</guid>
                </item>
                <item>
                    <title>ModSecurity version 3.0.0 first release candidate</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-version-300-first-release-candidate/</link>
                    <description>Recently we announced the first release candidate for libModSecurity (also as known as ModSecurity version 3). The goal was to turn ModSecurity into a mature library that could be used seamlessly regardless of web server or platform. The motivations for...
</description>
                    <pubDate>Wed, 30 Aug 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15785</guid>
                </item>
                <item>
                    <title>ModSecurity Web Application Firewall - Commercial Rules Update(2)</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-web-application-firewall-commercial-rules-update-2/</link>
                    <description>We have released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and above. These rules&#39; purpose is to protect against new emerging attacks that target vulnerabilities in public software. For this release we are highlighting virtual patches for...
</description>
                    <pubDate>Tue, 22 Aug 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15789</guid>
                </item>
                <item>
                    <title>Announcing ModSecurity version 2.9.2</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/announcing-modsecurity-version-292/</link>
                    <description>We recently released ModSecurity version 2.9.2. The release contains a number of bug fixes, including two security issues: Allan Boll reported an uninitialized variable that may lead to a crash on Windows platform. Brian Adeloye reported an infinite loop on...
</description>
                    <pubDate>Wed, 09 Aug 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15790</guid>
                </item>
                <item>
                    <title>ModSecurity Web Application Firewall - Commercial Rules Update(1)</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-web-application-firewall-commercial-rules-update-1/</link>
                    <description>We have released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and above. These rules&#39; purpose is to protect against new emerging attacks that target vulnerabilities in public software. For this release we would like to highlight the...
</description>
                    <pubDate>Wed, 12 Jul 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15795</guid>
                </item>
                <item>
                    <title>ModSecurity version 3: Fuzzing as part of the QA</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-version-3-fuzzing-as-part-of-the-qa/</link>
                    <description>The stability of any given project is often tracked by its maturity, which is generally measured by how old the code is. Even though this may be true a lot of the time, here at Trustwave SpiderLabs we wanted to...
</description>
                    <pubDate>Wed, 21 Jun 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15803</guid>
                </item>
                <item>
                    <title>ModSecurity Web Application Firewall - Commercial Rules Update</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-web-application-firewall-commercial-rules-update/</link>
                    <description>We have just released new commercial rules for ModSecurity Web Application Firewall (WAF) v2.9 and above. These rules&#39; purpose is to protect against new emerging attacks that target vulnerabilities in public software. For this release we would like to highlight...
</description>
                    <pubDate>Fri, 16 Jun 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15805</guid>
                </item>
                <item>
                    <title>Creating the ModSecurity v3 IDS connector as part of Google Summer of Code</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/creating-the-modsecurity-v3-ids-connector-as-part-of-google-summer-of-code/</link>
                    <description>A note from the Trustwave Spiderlabs ModSecurity team: The following blog was written at the culmination of the Google Summer Of Code (GSOC) program by Akhil Koul. The ModSecurity team mentored Akhil to help enhance the open source ModSecurity project...
</description>
                    <pubDate>Fri, 27 Jan 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15835</guid>
                </item>
                <item>
                    <title>Is ModSecurity’s SecRules Turing Complete?</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/is-modsecurity-s-secrules-turing-complete/</link>
                    <description>Have you ever seen a rule for ModSecurity? They may look similar to the following: SecRule REQUEST_URI &quot;@endswith example.com/index.html&quot; &quot;id:1,log,deny,redirect:http://modsecurity.org&quot; This rule may look complicated, but it is extremely basic. It says, if you find a URL ending with example.com/index.html...
</description>
                    <pubDate>Fri, 20 Jan 2017 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15837</guid>
                </item>
                <item>
                    <title>OWASP Core Rule Set 3.0.0 (Final) release</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/owasp-core-rule-set-300-final-release/</link>
                    <description>The OWASP Core Rule Set (CRS) team is excited to announce the immediate availability of the OWASP Core Rule Set Version 3.0.0 stable release. This release represents over two and a half years of effort with nearly 1000 commits and...
</description>
                    <pubDate>Fri, 11 Nov 2016 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15846</guid>
                </item>
                <item>
                    <title>OWASP ModSecurity CRS Version 3.0 RC2 Released</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/owasp-modsecurity-crs-version-30-rc2-released/</link>
                    <description>The OWASP Core Rule Set (CRS) is an Open Source project run by the Open Web Application Security Project (OWASP) and is frequently paired with the Open Source ModSecurity project. As part of Trustwave&#39;s commitment to ModSecurity, the Spiderlabs Web...
</description>
                    <pubDate>Wed, 19 Oct 2016 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15850</guid>
                </item>
                <item>
                    <title>OWASP ModSecurity CRS Version 3.0 RC1 Released</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/owasp-modsecurity-crs-version-30-rc1-released/</link>
                    <description>Trustwave has been dedicated to supporting ModSecurity and the associated community for the better part of a decade. Over this time, ModSecurity and the associated OWASP Core Rule Set (CRS) have seen major advances and are currently positioned as leading...
</description>
                    <pubDate>Mon, 15 Aug 2016 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15859</guid>
                </item>
                <item>
                    <title>Sending ModSecurity Logs to MySQL</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/sending-modsecurity-logs-to-mysql/</link>
                    <description>Previous Work As part of our positions at SpiderLabs Research we each get time to undertake various research tasks. Typically on the Web Server Security team we spend this time improving ModSecurity and Trustwave WAF, analyzing the latest web threats,...
</description>
                    <pubDate>Tue, 02 Feb 2016 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15902</guid>
                </item>
                <item>
                    <title>An Overview of the Upcoming libModSecurity</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/an-overview-of-the-upcoming-libmodsecurity/</link>
                    <description>libModSecurity is a major rewrite of ModSecurity. It preserves the rich syntax and feature set of ModSecurity while delivering improved performance, stability, and a new experience in easy integration on different. libModSecurity - Motivations While ModSecurity version 2.9.0 is available...
</description>
                    <pubDate>Mon, 28 Dec 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15908</guid>
                </item>
                <item>
                    <title>Protecting Your Sites from Apache.Commons Vulnerabilities</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/protecting-your-sites-from-apachecommons-vulnerabilities/</link>
                    <description>A few weeks ago, FoxGlove Security released this important blog post that includes several Proof-of-Concepts for exploiting Java unserialize vulnerabilities. A remote attacker can gain Remote Code Execution by sending specially crafted payload to any endpoint expecting a serialized...
</description>
                    <pubDate>Mon, 21 Dec 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15910</guid>
                </item>
                <item>
                    <title>Joomla 0-Day Exploited In the Wild (CVE-2015-8562)</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/joomla-0-day-exploited-in-the-wild-cve-2015-8562/</link>
                    <description>A recent new 0-day in Joomla discovered by Sucuri (Sucuri Blog) has drawn a lot of attention from the Joomla community, as well as attackers. Using knowledge gained from our recent research on Joomla (CVE-2015-7857, SpiderLabs Blog Post) and information...
</description>
                    <pubDate>Fri, 18 Dec 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15911</guid>
                </item>
                <item>
                    <title>Joomla SQL Injection Vulnerability Exploit Results in Full Administrative Access</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/joomla-sql-injection-vulnerability-exploit-results-in-full-administrative-access/</link>
                    <description>Trustwave SpiderLabs researcher Asaf Orpani has discovered an SQL injection vulnerability in versions 3.2 through 3.4.4 of Joomla, a popular open-source Content Management System (CMS). Combining that vulnerability with other security weaknesses, our Trustwave SpiderLabs researchers are able to gain...
</description>
                    <pubDate>Thu, 22 Oct 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15922</guid>
                </item>
                <item>
                    <title>Zero-day in Magmi database client for popular e-commerce platform Magento targeted in the wild</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/zero-day-in-magmi-database-client-for-popular-e-commerce-platform-magento-targeted-in-the-wild/</link>
                    <description>Magento is the most popular e-commerce platform owned by eBay since 2011. We illustrate how a severe security flaw can be introduced into a Magneto based e-commerce system, when installing a commonly used vulnerable version of the open-source Magmi utility and failing to change the default security configuration. The appearance of HTTP requests attempting to exploit this vulnerability in the wild indicates that some bad actors are onto this method as well. Once successful, the attacker gains the Magento site credentials and the encryption key for the Magento database.
</description>
                    <pubDate>Tue, 13 Oct 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15929</guid>
                </item>
                <item>
                    <title>[Honeypot Alert] Fritz!Box – Remote Command Execution Exploit Attempt</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/honeypot-alert-fritz-box-remote-command-execution-exploit-attempt/</link>
                    <description>Our web honeypots picked up some exploit attempts for a remote command execution vulnerability in FRITZ!Box, a series of routers produced by AVM. This exploit targets router firmware issues, and we&#39;re seeing an increase in this type of activity. Here...
</description>
                    <pubDate>Tue, 26 May 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15972</guid>
                </item>
                <item>
                    <title>OWASP/WASC Distributed Web Honeypots Project Re-Launch - Seeking Participants</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/owaspwasc-distributed-web-honeypots-project-re-launch-seeking-participants/</link>
                    <description>The SpiderLabs Research Team is proud to announce that we are officially re-launching the Distributed Web Honeypots Project under the new joint OWASP/WASC project home! For those SpiderLabs Blog readers who follow our &quot;Honeypot Alert&quot; series, you may be interested...
</description>
                    <pubDate>Tue, 31 Mar 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-15992</guid>
                </item>
                <item>
                    <title>[Honeypot Alert] FHS Null Byte Attack (CVE-2014-6287) Attempts to Install DDoS Malware (Iptablex)</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/honeypot-alert-fhs-null-byte-attack-cve-2014-6287-attempts-to-install-ddos-malware-iptablex/</link>
                    <description>Our web honeypots picked up some exploit attempts for CVE-2014-6287 which is a command execution vulnerability in the Rejetto HTTP File Server (aks HFS or HttpFileServer) product. Here is PoC vulnerability details from PacketStorm: Honeypot Attack Example One of our...
</description>
                    <pubDate>Wed, 25 Feb 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-16007</guid>
                </item>
                <item>
                    <title>Announcing ModSecurity v2.9.0 Stable Release</title>
                    <link>https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/announcing-modsecurity-v290-stable-release/</link>
                    <description>The SpiderLabs Research - ModSecurity Team is proud to announce the stable release of version 2.9.0 which contains bug fixes reported during the Release Candidate (RC) phase. The most important change from v2.9.0-RC2 to v2.9.0: Fix apr_crypto.h include, now checking...
</description>
                    <pubDate>Thu, 12 Feb 2015 00:00:00 GMT</pubDate>
                    <guid isPermaLink="false">Trustwave-16013</guid>
                </item>
    </channel>
</rss>