Security Labs

Blog

Blogs

The Websense Security Labs Blog delivers the most current information about breaking security research topics and today's advanced Internet threats.  Websense Security Labs investigates and publishes information about outbreaks, new threats and other relevant Web security topics to protect organizations from converging risks to their data from Web, email and user based attacks.

Go to the new Security Labs Blog

Following the Injection - a0v.org

08.26.2009 - 3:34 PM
We have been following the mass injection campaign that was reported last Friday. Websense Security Labs ThreatSeeker(TM) network also detected this threat, and Websense customers have been protected against it. We are interested in exploring these issues: What's been going on with this injection? What does it try to exploit, and how? In this blog we focus on the payload sites that follow the injection, to see where that takes us.
Read more »

Mass Injection of Chinese College Web Sites

08.14.2009 - 3:00 AM
Recently, since Microsoft released information about new vulnerabilities in MS Office and DirectShow in July, attacks spreading through the infection of thousands of legitimate Web sites have increased sharply in the wild. Coinciding with the student recruitment period after the Chinese National College Entrance Examination, the Web sites of universities and some higher education institutions have become the major targets of attackers.
Read more »

Keep Your Passwords Close and Your Password Secrets Closer

08.10.2009 - 7:00 PM
Bruce Schneier, over the years, has posted quite a number of blogs on password security. There are things we all know are common sense, yet we still break most of the fundamental rules.
Read more »

This Month in the Threat Webscape

08.10.2009 - 5:40 PM
This July we highlighted a few examples of high-profile Web sites that were compromised with malicious code. These particular threats are certainly interesting from a trend perspective, but in recapping the month of July, we would label it as a huge month for zero-day attacks and critical vulnerabilities.

We received reports of an Adobe zero-day in the wild, affecting Adobe Reader and Acrobat 9.2, as well as Flash Player 9 and 10, for Windows, Macintosh, and Linux operating systems.

We also tracked legitimate sites that were compromised to lead to a zero-day exploit targeting an Internet Explorer vulnerability. The compromised sites led to a handful of payload sites hosting the exploit code, which targeted an ActiveX control for streaming video. This and other zero-day vulnerabilities in Microsoft Office Web Components caused Microsoft to issue a rare out-of-band patch. More interesting news below...
Read more »

Patch Updates Coming to a Theater Near You

08.06.2009 - 3:00 PM
Patches have been flowing in since last week, some for 0days found in the the wild, some for 0days disclosed at Black Hat presentations given last week. In this post, I'm going to focus mainly on vulnerabilities related to client-side browsers.
Read more »

Black Hat Conference Wrap-up

08.03.2009 - 5:00 PM
We just got back from Black Hat/Defcon and wanted to summarize some of the research highlights of this year's con. If you were following us on Twitter, we tweeted the presentations that we found interesting. We certainly were not the only ones taking advantage of micro-blogging at the con.
Read more »