catandmouse.dev
Documenting the adversarial evolution of cybersecurity.
Attack → Response → Adaptation → Current State
Latest Entries
Classic memory corruption via stack smashing; killed by DEP, ASLR, and stack canaries becoming default OS protections.
Cloud Storage Phishing Hosting
🟡 LimitedHosting phishing pages on trusted cloud storage (GCS, S3, Azure Blob) to bypass URL reputation filters; still active but detection improving.