Blogs on STAR Labs278IN STACK · 2026-02-05 00:00
Pickling the Mailbox: A Deep Dive into CVE-2025-20393
TL;DR In December 2025, Cisco published https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 addressing CVE-2025-20393, a critical vulnerability (CVSS 10.0) affecting Cisco Secure Email Gateway and Secure Email and Web Manager. The advisory was notably sparse on technical details, describing only “Improper Input Validation” (CWE-20). We decided to dig deeper. Through reverse engineering and code analysis of AsyncOS 15.5.3, we uncovered the ro...
Blog27 · 2026-02-05 12:54
Cybereason TTP Briefing Q4 2025: Diverse Phishing Tactics and RATs on the Rise
Explore the latest trends, techniques, and procedures (TTPs) our incident response (IR) experts are actively facing with the TTP Briefing Q4 2025, a report built on frontline threat intelligence from our global incident response investigations, enriched by noteworthy detections from our SOC.
8th Light15 · 2026-02-05 06:00
The Design Process and Agile Development: Part 1 — Design Is Collaborative
This is Part 1 in our blog series on how the design process works alongside Agile methodology to produce results within an integrated team. Updated 2/5/2026. Originally published 2/2/2024 When it comes to developing new software, not every designer approaches the task the same way. While some use a design thinking approach , looking at the tasks from a user perspective, others use Agile methods , approaching it from an iterative project management standpoint. However, the two approaches are...
NVISO Labs12 · 2026-02-05 10:54
An introduction to automated LLM red teaming
Introduction As large language models become increasingly embedded in production applications, from customer service chatbots to code assistants and document analysis tools, the security implications of these systems have moved from theoretical concern to practical necessity. Unlike traditional software security testing, LLM red teaming addresses unique challenges: prompt injection attacks, data leakage through carefully crafted … Continue reading An introduction to automated LLM red teaming →