Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Lessons from a Honeypot with US Citizens’ Data

Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work ...

Read More

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

Introduction In the perpetually evolving field of cybersecurity, new threats materialize daily. ...

Read More

Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928

In early 2021, a new vulnerability, identified as CVE-2021-27928, was discovered and published. It ...

Read More

The Sentinel’s Watch: Building a Security Reporting Framework

Imagine being on shift as the guard of a fortress. Your job is to identify threats as they approach ...

Read More

Protecting Zion: InfoSec Encryption Concepts and Tips

This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...

Read More

The Secret Cipher: Modern Data Loss Prevention Solutions

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...

Read More