BEC Trends: Payroll Diversion Dominates and Sneaky Multi-Persona Attacks Emerge
Business Email Compromise (BEC) remains a lucrative threat vector for attackers. The FBI’s IC3 ...
Read MoreBusiness Email Compromise (BEC) remains a lucrative threat vector for attackers. The FBI’s IC3 ...
Read MoreIntroduction Recently, we’ve seen a noticeable surge in malware cases linked to a malicious payload ...
Read MoreAs technology continues to evolve, there is a growing concern about the potential for large ...
Read MoreTrustwave SpiderLabs discovered a new version of the Rilide Stealer extension targeting ...
Read MoreIntro Since Redis is becoming increasingly popular around the world, we decided to investigate ...
Read MoreThe healthcare sector has been under constant threat from cybercriminals due to the sensitive ...
Read MoreModSecurity is an open-source Web Application Firewall (WAF) engine maintained by Trustwave. This ...
Read MoreIn their latest report titled "Cybersecurity in the Healthcare Industry: Actionable Intelligence ...
Read MoreAs they say, when it rains, it pours. Recently, we observed more than 3,000 phishing emails ...
Read MoreTo obtain a better perspective of attacks worldwide, Trustwave has implemented a network of ...
Read MoreIntroduction In a constantly connected world, protecting sensitive data in what are often complex ...
Read MoreRecently, I discovered two vulnerabilities in the ButterflyMX system which were responsibly ...
Read MoreIn a recent development, Russian hackers have declared their intention to launch cyberattacks on ...
Read MoreIn today's digital era, the importance of securing databases cannot be overstated. As more and more ...
Read MoreOn May 19, 2023, Barracuda Networks identified a remote command injection vulnerability ...
Read MoreI've been pentesting applications for nearly two decades now and throughout that time you get to ...
Read MoreUpdate - June 16, 2023: The second vulnerability mentioned in the June 12 update now has an ...
Read MoreAs is tradition with my blog posts, let’s start off a definition of what HTTP pipelining is all ...
Read MoreInformation disclosed in the leaked NTC Vulkan papers allows us to investigate the high probability ...
Read MoreOver the past few days, we have seen phishing attacks that use a combination of compromised ...
Read MoreFor those wondering what GraphQL is…
Read MoreA user impersonation feature typically allows a privileged user, such as an administrator, but ...
Read MoreI feel I need to clarify, for legal reasons, that this is nothing to do with any Harry Potter game. ...
Read MoreIgnoring the little stuff is never a good idea. Anyone who has pretended that the small noise their ...
Read MoreSecurity best practice guidelines always call for changing default passwords as any password left ...
Read MoreTowards the end of 2020, a new vulnerability in MongoDB was found and published. The vulnerability ...
Read MoreA little bit of background for those not familiar with chfn…
Read More