SharpParty: Process Injection in C#
November 11, 2025 | Will Rabb
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from Trustwave, A LevelBlue Company.
The Invisible Battleground: Essentials of EASM
April 22, 2024 | David Broggy
Know your enemy – inside and out. External Attack Surface Management tools are ...
Fake Dialog Boxes to Make Malware More Convincing
April 17, 2024 | Ram Prakash
Let’s explore how SpiderLabs created and incorporated user prompts, ...
Evaluating Your Security Posture: Security Assessment Basics
March 25, 2024 | David Broggy
This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Bypassing MFA: A Pentest Case Study
March 11, 2022 | Adeeb Shah
When a company implements multifactor authentication, the organization is ...
Missing Critical Vulnerabilities Through Narrow Scoping
September 16, 2021 | John Anderson
The typical process when scoping a penetration test is to get a list of targets ...
Web Applications and Internal Penetration Tests
May 25, 2021 | Bruno Oliveira
Until recently, I really didn't care about web applications on an internal ...
Still Scanning IP Addresses You’re Doing it Wrong
July 02, 2020 | John Anderson
The traditional approach to a vulnerability scan or penetration test is to find ...
Time Windows for Penetration Testing
November 22, 2019 | Albert Campa
Often when penetration tests are scheduled, it will be requested that testing ...