HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

Displaying articles for: June 2014

HPSR Software Security Content 2014 Update 2

HP Security Research and the Software Security Research group are pleased to announce the immediate availability of updates to HP WebInspect SecureBase (available via SmartUpdate), the HP Fortify Secure Coding Rulepacks (English language, version 2014.2.0), HP Fortify Runtime Application Protection, and HP Fortify Premium Content. 


The Software Security Research group translates cutting-edge security research into security intelligence that powers the HP Enterprise Security Products portfolio. Today, HPSR Software Security Content supports over 860 vulnerability categories across 21 programming languages and spanning more than 737,000 individual APIs.



HP Security Research OSINT (OpenSource Intelligence) articles of interest--June 27, 2014

OSINT.jpgIt's Friday, June 27th, and you know what that means--It's time for the list of HP Security Research OSINT articles of interest! 

Labels: HPSR

HP Security Briefing, episode 14 - malicious file vizualization and clustering

In this month’s Security Briefing, we conduct a number of experiments with file geometry visualization and clustering algorithms on malicious and clean files using R language. You can listen to this episode of the HP Security Briefing podcast on the Web or via iTunes, and you can read or download the detailed companion report report here.

HP Security Research OSINT (OpenSource Intelligence) articles of interest--June 20, 2014

OSINT.jpgIt's the June 20th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  

Labels: HPSR

HP Security Research OSINT (OpenSource Intelligence) articles of interest--June 13, 2014

OSINT.jpgIt's time for the June 13th list of HP Security Research OSINT articles of interest! This is a list of publically available articles that we find relevant in today's security news.  

Labels: security

Playing with Adobe Flash Player Exploits and Byte Code

Basically, SWF files are not something you can avoid analyzing if you are dealing with real-life exploits. A good methodology when analyzing SWF files is also very beneficial for current malware research. I talked about automating SWF exploits and malware analysis in a previous presentation, but here I want to share a more manual methodology you can use for daily research. All the tools are free and some of them are open source. For this example, I used a sample with a SHA1 value of 300a7e4d54eca8641d7a19ceb4ab68bb76696816. This sample exploits the CVE-2014-0515 vulnerability. 

Bitcoin and security (part 1 of 3)

In the first post of a three-part series, we look at Bitcoin basics: how it works, where its security profile fits into the eternal confidentiality-integrity-availability triad, and why the underpinnings of the currency are a noteworthy attempt to solve one of Internet security’s thorniest problems. We also take a peek at the guts of a Bitcoin ATM – and recognize a familiar operating system under the hood.

HP Security Research OSINT (OpenSource Intelligence) articles of interest--June 6, 2014

OSINT.jpgIt's the first Friday in June--and here are your HP Security Research OSINT articles of interest. This blog post provides links to current events related to the cyber security industry. 

Labels: HP| security

Once Bled, Twice Shy (OpenSSL: CVE-2014-0195)

CVE-2014-0195 is the latest critical vulnerability in a string of OpenSSL bugs.  The bug was submitted through the HP Security Research Zero Day Initiative program and filter guidance was provided immediately in the form of predisclosure filters for TippingPoint customers exclusively.  Read on for more details about this vulnerability and the protection only TippingPoint customers can experience!

ZDI-14-173/CVE-2014-0195 - OpenSSL DTLS Fragment Out-of-Bounds Write: Breaking up is hard to do

Researchers are upping their efforts to review OpenSSL source code to find additional vulnerabilities.  This left us wondering: “What will we find next?”  Well, it didn’t take long for another critical OpenSSL vulnerability to show up in the queues at the Zero Day Initiative.  Jüri Aedla is credited for the original discovery of this vulnerability and this blog describes the vulnerability also known as ZDI-14-173 (CVE-2014-0195).

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
  • Head of OpSec Research
  • I am a senior security content developer with Hewlett-Packard Security Research (HPSR). In this role, I write and edit security analysis and supporting content from researchers, including those from HP’s Zero Day Initiative (ZDI) program. The ZDI program augments HP’s Enterprise Security Products with zero-day research through a network of over 3,000 independent researchers around the world. I am also responsible for providing insight into the threat landscape; competitive intelligence to the research team; and providing guidance on the social media roadmap. Part of my role includes speaking publicly and promoting the research and technology of the HPSR.
  • Kernelsmith is senior vulnerability researcher with Hewlett-Packard Security Research (HPSR). In this role, he analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the Zero-Day Initiative (ZDI) program. He also tries to automate whenever he can, pulling from the devops and virtualization arenas. Josh is also a developer for the Metasploit Framework and has spoken at a few conferences and holds a few certifications. Prior to joining HP, Smith served in the U.S. Air Force for 10 years and subsequently became a security engineer at the John Hopkins University Applied Physics Laboratory. Smith performed research into weapons systems vulnerabilities as well as evasion and obfuscation techniques to add depth and realism to security device tests. Smith received a B.S. in Aeronautical Engineering from Rensselaer Polytechnic Institute and an M.A. in Management of Information Systems from the University of Great Falls.
  • Security Researcher, Software Security Research
  • Security Researcher, Zero Day Initiative
  • Steve Povolny manages the Digital Vaccine team at HP TippingPoint. The team is composed of security researchers and filter/signature developers for the Intrusion Prevention System.
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.