Hackers Leverage Cloud Platforms to Spread Phishing Under the Radar
July 03, 2020 | Simon Kenin
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from Trustwave, A LevelBlue Company.
Lifesize Team, Room, Passport & Networker Remote OS Command Injection
February 07, 2019 | Simon Kenin
While working on various vulnerability research projects, I encountered ...
Hacker's Wish Come True After Infecting Visitors of Make-A-Wish Website With Cryptojacking
November 19, 2018 | Simon Kenin
After coming back from a vacation, the first thing to do is catch up with what ...
All Your Base64 Are Belong To Us – Dynamic vs. Static Analysis of Web Content
April 11, 2018 | Simon Kenin
I recently encountered an interesting phishing scheme when reviewing telemetry ...
Mass MikroTik Router Infection – First we cryptojack Brazil, then we take the World?
February 12, 2018 | Simon Kenin
On July 31st , just after getting back to the office from my talk at RSA Asia ...
BrickerBot mod_plaintext Analysis
December 19, 2017 | Simon Kenin
A week ago, the author of BrickerBot claimed that they retired and published ...
Underground Scams: Cutting the Head Off a Snake
February 02, 2017 | Simon Kenin
Shortly after publishing our post about Terror EK, "King Cobra" (a Twitter ...
CVE-2017-5521: Bypassing Authentication on NETGEAR Routers
January 30, 2017 | Simon Kenin
Home routers are the first and sometimes last line of defense for a network. ...
Terror Exploit Kit? More like Error Exploit Kit
January 09, 2017 | Simon Kenin
Q: What does it take to create a simple, yet fully functioning exploit kit?
Suzy’s Phishing Season
May 17, 2016 | Simon Kenin
Although most SWG-related blogs talk about exploit kits and malicious code, ...