SharpParty: Process Injection in C#
November 11, 2025 | Will Rabb
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from Trustwave, A LevelBlue Company.
Data in the Dark: The Public Sector on the Dark Web
October 15, 2025
The dark web serves as a refuge for threat actors to gather intel, trade ...
How Researchers Collect Indicators of Compromise
August 14, 2025 | Messiah Dela Cruz
As security researchers, we actively monitor the latest CVEs and their publicly ...
Storm-0558 and the Dangers of Cross-Tenant Token Forgery
May 21, 2025 | Damian Archer
Modern cloud ecosystems often place a single identity provider in charge of ...
Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development
May 16, 2025 | Damian Archer
Dependency management is one of the biggest challenges in modern software ...
Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks
April 21, 2025 | Tom Neaves
I think you’ll agree with me that growth in the AI landscape is pretty full-on ...
Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)
March 24, 2025 | Tom Neaves
The concept of “principle of least privilege” has been around for a long time. ...
Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2
March 20, 2025 | Karl Biron
In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your ...
2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector
February 26, 2025
2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: ...
Exploring an Experimental Windows Kernel Rootkit in Rust
September 09, 2024 | memN0ps
Around two years ago, memN0ps took the initiative to create one of the first ...
Hypervisor Development in Rust for Security Researchers (Part 1)
September 06, 2024 | memN0ps
In the ever-evolving field of information security, curiosity and continuous ...
Your Money or Your Data: Ransomware Readiness Planning
September 02, 2024 | David Broggy
Today’s blog installment brings us to the end of our 30-week journey that ...
The Willy Wonka World of Application Security Defenses
August 26, 2024 | David Broggy
One doesn’t have to be a magician to understand how to track the hundreds, if ...
The Bug Stops Here: Using DevSecOps Workflows for Pest-Free Applications
August 19, 2024 | David Broggy
Developers and cybersecurity have an interesting relationship. Developers have ...
The Art of Deception: Turning the Tables on Attackers with Active Defenses
August 12, 2024 | David Broggy
Once an attacker enters your network, one of their first actions will be to try ...
Knowing your Enemy: Situational Awareness in Cyber Defenses
July 29, 2024 | David Broggy
Most homeowners know that a lock is a good idea as a basic defense against ...
Using AWS Secrets Manager and Lambda Function to Store, Rotate and Secure Keys
July 16, 2024 | Sally Gebreananeya
When working with Amazon Web Services (AWS), we often find that various AWS ...
Tips for Optimizing Your Security Operations Framework
July 15, 2024 | David Broggy
Building an effective Security Operations framework that provides the right ...
Network Isolation for DynamoDB with VPC Endpoint
July 09, 2024 | Selam Gebreananeya
DynamoDB is a fully managed NoSQL database service offered by Amazon Web ...
Clockwork Blue: Automating Security Defenses with SOAR and AI
July 01, 2024 | David Broggy
It’s impractical to operate security operations alone, using manual human ...
Cyber Exterminators: Monitoring the Shop Floor with OT Security
June 03, 2024 | David Broggy
Pressure is increasing on manufacturers to monitor their shop floors for ...
Important Security Defenses to Help Your CISO Sleep at Night
May 20, 2024 | David Broggy
This is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 ...
How to Create the Asset Inventory You Probably Don't Have
May 13, 2024 | David Broggy
This is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Protecting Zion: InfoSec Encryption Concepts and Tips
April 29, 2024 | David Broggy
This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 ...
EDR – The Multi-Tool of Security Defenses
April 22, 2024 | David Broggy
This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 ...
The Invisible Battleground: Essentials of EASM
April 22, 2024 | David Broggy
Know your enemy – inside and out. External Attack Surface Management tools are ...
The Secret Cipher: Modern Data Loss Prevention Solutions
April 15, 2024 | David Broggy
This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Trustwave's Action Response: Multiple Log4j Zero-Day Vulnerabilities
December 10, 2021 | SpiderLabs Researcher
Updates: Dec. 29: Updated to cover three additional CVEs: CVE-2021-4104, ...