Meet the Author

Connor Jackson

Connor Jackson

Connor Jackson is a Security Research Manager at CyberMaxx, with a background in forensics, reverse engineering, and threat-hunting.

Check out Connor’s LinkedIn

Connor Jackson Articles

Solana NPM package has been compromised

Solana NPM package has been compromised

Threat Alert

2 min read

The Rise of Malicious Honeypots: A New Threat in Cyber Deception Tactics

The Rise of Malicious Honeypots: A New Threat in Cyber Deception Tactics

Articles

5 min read

Tracing the History of Ransomware: Major Attacks and Developments

Tracing the History of Ransomware: Major Attacks and Developments

Articles

7 min read

Malicious Honeypots Polluting Internet Scanner Results

Malicious Honeypots Polluting Internet Scanner Results

Research

4 min read

Ransomware Research Report | Q3 2024 – Audio Blog Interview

Ransomware Research Report | Q3 2024 – Audio Blog Interview

Research

3 min read

M365 Testing Tool: MSSprinkler available on GitHub

M365 Testing Tool: MSSprinkler available on GitHub

Articles

1 min read

Lockbit Countdown

Lockbit Countdown

Articles

1 min read

The Role of Threat Profiling in Building a Proactive Cybersecurity Strategy

The Role of Threat Profiling in Building a Proactive Cybersecurity Strategy

Articles

6 min read

CVE-2024-38063

CVE-2024-38063

Threat Alert

1 min read

Ransomware Research Report | Q2 2024 – Audio Blog Interview

Ransomware Research Report | Q2 2024 – Audio Blog Interview

Research

3 min read

RockYou2024 Password List

RockYou2024 Password List

Threat Alert

2 min read

CISO Summer Checklist

CISO Summer Checklist

Articles

3 min read

Securing Mid-Market Businesses Against Ransomware Challenges

Securing Mid-Market Businesses Against Ransomware Challenges

Articles

4 min read

LockBit takedown May 2024

LockBit takedown May 2024

Threat Alert

3 min read

Ransomware Research Report | Q1 2024 – Audio Blog Interview

Ransomware Research Report | Q1 2024 – Audio Blog Interview

Research

3 min read

Threat Alert affecting Palo Alto

Threat Alert affecting Palo Alto

Threat Alert

1 min read

Hypothesis Centered Threat Hunting

Hypothesis Centered Threat Hunting

Articles

3 min read

Ransomware Research Report | Q4 2023 – Audio Blog Interview

Ransomware Research Report | Q4 2023 – Audio Blog Interview

Research

3 min read

CISO Holiday Checklist

CISO Holiday Checklist

Articles

3 min read

Ransomware Research Report | Q3 2023 – Audio Blog Interview

Ransomware Research Report | Q3 2023 – Audio Blog Interview

Articles

2 min read

DarkGate Malware: Initial Loaders and How to Mitigate Issues

DarkGate Malware: Initial Loaders and How to Mitigate Issues

Articles

3 min read

Ransomware Research Report | Q2 2023 – Audio Blog Interview

Ransomware Research Report | Q2 2023 – Audio Blog Interview

Articles

2 min read

Ransomware Research Report | Q1 2023 – Audio Blog Interview

Ransomware Research Report | Q1 2023 – Audio Blog Interview

Articles

3 min read

Threat Research Series: Evasion and Fileless Persistence from First-Stage Malware

Threat Research Series: Evasion and Fileless Persistence from First-Stage Malware

Research

5 min read