Threat-Loaded: Malicious PDFs Never Go Out of Style
Introduction In the realm of cybersecurity, danger hides where we least expect it and threats ...
Read MoreIntroduction In the realm of cybersecurity, danger hides where we least expect it and threats ...
Read MoreIn this blog post, we will explore how the computer security landscape has expanded to reach below ...
Read MoreQR Codes, the square images that contain coded information that can be scanned by a smartphone, are ...
Read MoreAs the world shifted into remote work and distant learning during the pandemic lockdown, e-commerce ...
Read MoreBusiness Email Compromise (BEC) remains a lucrative threat vector for attackers. The FBI’s IC3 ...
Read MoreIntroduction Recently, we’ve seen a noticeable surge in malware cases linked to a malicious payload ...
Read MoreAs technology continues to evolve, there is a growing concern about the potential for large ...
Read MoreTrustwave SpiderLabs discovered a new version of the Rilide Stealer extension targeting ...
Read MoreIntro Since Redis is becoming increasingly popular around the world, we decided to investigate ...
Read MoreThe healthcare sector has been under constant threat from cybercriminals due to the sensitive ...
Read MoreModSecurity is an open-source Web Application Firewall (WAF) engine maintained by Trustwave. This ...
Read MoreIn their latest report titled "Cybersecurity in the Healthcare Industry: Actionable Intelligence ...
Read MoreAs they say, when it rains, it pours. Recently, we observed more than 3,000 phishing emails ...
Read MoreTo obtain a better perspective of attacks worldwide, Trustwave has implemented a network of ...
Read MoreIntroduction In a constantly connected world, protecting sensitive data in what are often complex ...
Read MoreRecently, I discovered two vulnerabilities in the ButterflyMX system which were responsibly ...
Read MoreIn a recent development, Russian hackers have declared their intention to launch cyberattacks on ...
Read MoreIn today's digital era, the importance of securing databases cannot be overstated. As more and more ...
Read MoreOn May 19, 2023, Barracuda Networks identified a remote command injection vulnerability ...
Read MoreI've been pentesting applications for nearly two decades now and throughout that time you get to ...
Read MoreUpdate - June 16, 2023: The second vulnerability mentioned in the June 12 update now has an ...
Read MoreAs is tradition with my blog posts, let’s start off a definition of what HTTP pipelining is all ...
Read MoreInformation disclosed in the leaked NTC Vulkan papers allows us to investigate the high probability ...
Read MoreOver the past few days, we have seen phishing attacks that use a combination of compromised ...
Read MoreFor those wondering what GraphQL is…
Read MoreA user impersonation feature typically allows a privileged user, such as an administrator, but ...
Read MoreI feel I need to clarify, for legal reasons, that this is nothing to do with any Harry Potter game. ...
Read More