SharpParty: Process Injection in C#

November 11, 2025 | Will Rabb

Hunter

Data in the Dark: The Public Sector on the Dark Web

October 15, 2025

The dark web serves as a refuge for threat actors to gather intel, trade ...

How Researchers Collect Indicators of Compromise

August 14, 2025 | Messiah Dela Cruz

As security researchers, we actively monitor the latest CVEs and their publicly ...

Storm-0558 and the Dangers of Cross-Tenant Token Forgery

May 21, 2025 | Damian Archer

Modern cloud ecosystems often place a single identity provider in charge of ...

Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development

May 16, 2025 | Damian Archer

Dependency management is one of the biggest challenges in modern software ...

Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks

April 21, 2025 | Tom Neaves

I think you’ll agree with me that growth in the AI landscape is pretty full-on ...

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

March 24, 2025 | Tom Neaves

The concept of “principle of least privilege” has been around for a long time. ...

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

March 20, 2025 | Karl Biron

In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your ...

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector

February 26, 2025

2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: ...

Exploring an Experimental Windows Kernel Rootkit in Rust

September 09, 2024 | memN0ps

Around two years ago, memN0ps took the initiative to create one of the first ...

Hypervisor Development in Rust for Security Researchers (Part 1)

September 06, 2024 | memN0ps

In the ever-evolving field of information security, curiosity and continuous ...

Your Money or Your Data: Ransomware Readiness Planning

September 02, 2024 | David Broggy

Today’s blog installment brings us to the end of our 30-week journey that ...

The Willy Wonka World of Application Security Defenses

August 26, 2024 | David Broggy

One doesn’t have to be a magician to understand how to track the hundreds, if ...

The Bug Stops Here: Using DevSecOps Workflows for Pest-Free Applications

August 19, 2024 | David Broggy

Developers and cybersecurity have an interesting relationship. Developers have ...

The Art of Deception: Turning the Tables on Attackers with Active Defenses

August 12, 2024 | David Broggy

Once an attacker enters your network, one of their first actions will be to try ...

Knowing your Enemy: Situational Awareness in Cyber Defenses

July 29, 2024 | David Broggy

Most homeowners know that a lock is a good idea as a basic defense against ...

Using AWS Secrets Manager and Lambda Function to Store, Rotate and Secure Keys

July 16, 2024 | Sally Gebreananeya

When working with Amazon Web Services (AWS), we often find that various AWS ...

Tips for Optimizing Your Security Operations Framework

July 15, 2024 | David Broggy

Building an effective Security Operations framework that provides the right ...

Network Isolation for DynamoDB with VPC Endpoint

July 09, 2024 | Selam Gebreananeya

DynamoDB is a fully managed NoSQL database service offered by Amazon Web ...

Clockwork Blue: Automating Security Defenses with SOAR and AI

July 01, 2024 | David Broggy

It’s impractical to operate security operations alone, using manual human ...

Cyber Exterminators: Monitoring the Shop Floor with OT Security

June 03, 2024 | David Broggy

Pressure is increasing on manufacturers to monitor their shop floors for ...

Important Security Defenses to Help Your CISO Sleep at Night

May 20, 2024 | David Broggy

This is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 ...

How to Create the Asset Inventory You Probably Don't Have

May 13, 2024 | David Broggy

This is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Protecting Zion: InfoSec Encryption Concepts and Tips

April 29, 2024 | David Broggy

This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 ...

EDR – The Multi-Tool of Security Defenses

April 22, 2024 | David Broggy

This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 ...

The Invisible Battleground: Essentials of EASM

April 22, 2024 | David Broggy

Know your enemy – inside and out. External Attack Surface Management tools are ...

The Secret Cipher: Modern Data Loss Prevention Solutions

April 15, 2024 | David Broggy

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Trustwave's Action Response: Multiple Log4j Zero-Day Vulnerabilities

December 10, 2021 | SpiderLabs Researcher

Updates: Dec. 29: Updated to cover three additional CVEs: CVE-2021-4104, ...