Meet the Author

Connor Jackson

Connor Jackson

Connor Jackson is a Security Research Manager at CyberMaxx, with a background in forensics, reverse engineering, and threat-hunting.

Check out Connor’s LinkedIn

Connor Jackson Articles

How Did the September npm Maintainer Account Compromise Happen and What Can We Learn from it?

How Did the September npm Maintainer Account Compromise Happen and What Can We Learn from it?

Cybersecurity News

4 min read

How Did the Shai-Hulud npm Attack Happen and What Can We Learn from it?

How Did the Shai-Hulud npm Attack Happen and What Can We Learn from it?

Cybersecurity News

4 min read

Ransomware Research Report | Q3 2025 – Audio Blog Interview

Ransomware Research Report | Q3 2025 – Audio Blog Interview

Interviews

2 min read

What’s Driving the Rise of Ransomware in Manufacturing?

What’s Driving the Rise of Ransomware in Manufacturing?

Articles

3 min read

Extortion Without Encryption: The Next Phase of Ransomware

Extortion Without Encryption: The Next Phase of Ransomware

Articles

5 min read

Critical Entra ID Vulnerability CVE-2025-55241: Microsoft Issues Emergency Fix for Cross-Tenant Token Exploit

Critical Entra ID Vulnerability CVE-2025-55241: Microsoft Issues Emergency Fix for Cross-Tenant Token Exploit

Cybersecurity News

2 min read

Largest NPM Supply Chain Attack Disrupts Billions of Downloads

Largest NPM Supply Chain Attack Disrupts Billions of Downloads

Threat Alert

2 min read

Ransomware Research Report | Q2 2025 – Audio Blog Interview

Ransomware Research Report | Q2 2025 – Audio Blog Interview

Interviews

4 min read

CVE-2025-53770: SharePoint “ToolShell” Zero-Day Exploit – What You Need to Know

CVE-2025-53770: SharePoint “ToolShell” Zero-Day Exploit – What You Need to Know

Threat Alert

3 min read

Critical Cisco Flaw: CVE-2025-20309 Grants Remote Root Access

Critical Cisco Flaw: CVE-2025-20309 Grants Remote Root Access

Cybersecurity News

1 min read

CISO Summer Checklist

CISO Summer Checklist

Articles

3 min read

The Lockbit Leak Exposed: Secrets of a Ransomware Gang

The Lockbit Leak Exposed: Secrets of a Ransomware Gang

Cybersecurity News

3 min read

Conti Ransomware Gang Rank EDR Solutions Based on Ease of Evasion

Conti Ransomware Gang Rank EDR Solutions Based on Ease of Evasion

Articles

2 min read

The State of Ransomware in Healthcare

The State of Ransomware in Healthcare

Company News

3 min read

Ransomware Research Report | Q1 2025 – Audio Blog Interview

Ransomware Research Report | Q1 2025 – Audio Blog Interview

Interviews

4 min read

CVE-2025-29927: Critical Vulnerability Leading to Authentication Bypass in Next.js

CVE-2025-29927: Critical Vulnerability Leading to Authentication Bypass in Next.js

Threat Alert

1 min read

3 Vulnerabilities Identified in VMWare’s ESXi, allowing for VM Escape

3 Vulnerabilities Identified in VMWare’s ESXi, allowing for VM Escape

Threat Alert

1 min read

How does a Malicious OAuth Application Attack work? – Oauth2 Research

How does a Malicious OAuth Application Attack work? – Oauth2 Research

Research

6 min read

Why Ransomware Payments Plummeted in 2024

Why Ransomware Payments Plummeted in 2024

Articles

4 min read

Ransomware Research Report | Q4 2024 – Audio Blog Interview

Ransomware Research Report | Q4 2024 – Audio Blog Interview

Interviews

3 min read

LDAPNightmare Detection & Mitigation: CVE-2024-49113 & CVE-2024-49112

LDAPNightmare Detection & Mitigation: CVE-2024-49113 & CVE-2024-49112

Threat Alert

1 min read

Leveraging Deception Technology for Enhanced Cyber Defense

Leveraging Deception Technology for Enhanced Cyber Defense

Articles

4 min read

Solana NPM package has been compromised

Solana NPM package has been compromised

Threat Alert

2 min read

The Rise of Malicious Honeypots: A New Threat in Cyber Deception Tactics

The Rise of Malicious Honeypots: A New Threat in Cyber Deception Tactics

Articles

5 min read

Tracing the History of Ransomware: Major Attacks and Developments

Tracing the History of Ransomware: Major Attacks and Developments

Articles

7 min read

Malicious Honeypots Polluting Internet Scanner Results

Malicious Honeypots Polluting Internet Scanner Results

Research

4 min read

Ransomware Research Report | Q3 2024 – Audio Blog Interview

Ransomware Research Report | Q3 2024 – Audio Blog Interview

Research

3 min read

M365 Testing Tool: MSSprinkler available on GitHub

M365 Testing Tool: MSSprinkler available on GitHub

Articles

1 min read

Lockbit Countdown

Lockbit Countdown

Articles

1 min read

The Role of Threat Profiling in Building a Proactive Cybersecurity Strategy

The Role of Threat Profiling in Building a Proactive Cybersecurity Strategy

Articles

6 min read

CVE-2024-38063

CVE-2024-38063

Threat Alert

1 min read

Ransomware Research Report | Q2 2024 – Audio Blog Interview

Ransomware Research Report | Q2 2024 – Audio Blog Interview

Research

3 min read

RockYou2024 Password List

RockYou2024 Password List

Threat Alert

2 min read

Securing Mid-Market Businesses Against Ransomware Challenges

Securing Mid-Market Businesses Against Ransomware Challenges

Articles

4 min read

LockBit takedown May 2024

LockBit takedown May 2024

Threat Alert

3 min read

Ransomware Research Report | Q1 2024 – Audio Blog Interview

Ransomware Research Report | Q1 2024 – Audio Blog Interview

Research

3 min read

Threat Alert affecting Palo Alto

Threat Alert affecting Palo Alto

Threat Alert

1 min read

Hypothesis Centered Threat Hunting

Hypothesis Centered Threat Hunting

Articles

3 min read

Ransomware Research Report | Q4 2023 – Audio Blog Interview

Ransomware Research Report | Q4 2023 – Audio Blog Interview

Research

3 min read

CISO Holiday Checklist

CISO Holiday Checklist

Articles

3 min read

Ransomware Research Report | Q3 2023 – Audio Blog Interview

Ransomware Research Report | Q3 2023 – Audio Blog Interview

Articles

2 min read

DarkGate Malware: Initial Loaders and How to Mitigate Issues

DarkGate Malware: Initial Loaders and How to Mitigate Issues

Articles

3 min read

Ransomware Research Report | Q2 2023 – Audio Blog Interview

Ransomware Research Report | Q2 2023 – Audio Blog Interview

Articles

2 min read

Ransomware Research Report | Q1 2023 – Audio Blog Interview

Ransomware Research Report | Q1 2023 – Audio Blog Interview

Articles

3 min read

Threat Research Series: Evasion and Fileless Persistence from First-Stage Malware

Threat Research Series: Evasion and Fileless Persistence from First-Stage Malware

Research

5 min read