The Cat's Out of the Bag: A 'Meow Attack' Data Corruption Campaign Simulation via MAD-CAT

November 07, 2025 | Karl Biron

Hunter

Using SQLmap to Dig for Sensitive Data in SQL Databases

July 22, 2025 | Karl Biron

In our latest report Data Pirates' Toolkit (Leveraging SQLmap for Unearthing ...

Lights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities

May 06, 2025 | Karl Biron

Let’s explore the critical role of Modbus in energy and manufacturing systems, ...

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

March 20, 2025 | Karl Biron

In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your ...

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1

March 19, 2025 | Karl Biron

Picture this: an always-awake, never-tired, high-speed librarian that instantly ...

Cracking the Giant: How ODAT Challenges Oracle, the King of Databases

January 27, 2025 | Karl Biron

In the past decade, Oracle Database (Oracle DB) has reigned supreme in the ...

The Database Slayer: Deep Dive and Simulation of the Xbash Malware

January 14, 2025 | Karl Biron

In the world of malware, common ransomware schemes aim to take the data within ...

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

October 17, 2024 | Karl Biron

Introduction In the perpetually evolving field of cybersecurity, new threats ...

Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928

August 16, 2024 | Karl Biron

In early 2021, a new vulnerability, identified as CVE-2021-27928, was ...