Cyber Space Station
  • Home
  • About
  • Vulnerabilities
  • Research
  • Tools
Sign in Subscribe

Research

The Research section offers in-depth analyses and detailed write-ups on a variety of cybersecurity topics, providing valuable insights and expert perspectives to keep you informed and ahead of the curve.
Microsoft 365 Phishing Token Theft Attack
Research

Microsoft 365 Phishing Token Theft Attack

Identity Provider (IdP) token theft is a growing tactic in todays phishing attacks. Token theft can happen in many ways but a common real world method is token theft through a phishing email/site. Here I will map out the attack chain that I've seen and become familiar
17 Dec 2024 7 min read
Windows Virtualization-Based Security: What is it?
Research

Windows Virtualization-Based Security: What is it?

Windows Virtualization-based Security (VBS) is a security integration that uses virtualization to enhance your device's security. It utilizes Windows hypervisor to create a virtual environment for security features to operate in isolated sections of the operating system. With this feature, the trust boundaries of your computer are changed.
22 Aug 2024 4 min read
Protecting yourself from Identity Theft
Research

Protecting yourself from Identity Theft

Recently, there have been many data breaches exposing Personally Identifiable Information (PII), making it likely that your full name, email address, home address, phone numbers, credit card numbers, and Social Security Numbers (SSN) are now circulating on the dark web. This information is just waiting for a bad actor to
20 Aug 2024 3 min read
Page 1 of 1
Cyber Space Station © 2025
Powered by Ghost