Cloning a Voice from a Voicemail
How to Run RVC WebUI on RTX 50-Series GPUs (Python 3.10 + PyTorch 2.7)
DeepFakes: How attackers are weaponising real-time face swapping
Deepfakes have evolved from niche internet curiosities into real-world weapons. From fake job interviews andn romance schemes to impersonating public figures in crypto scams, Deep Fakes are only becoming more of a problem. This blog is designed to cover the tactics, real-world cases, and why seeing shouldn’t mean believing anymore.
Honeypot – stats after 1 day
Honeypot Day 1 statistics… Let’s find out who’s being cheeky hackers.
How to protect against modern phishing attacks like Evilginx
Phishing attacks are wreaking havoc across businesses - Using modern phishing techniques, malicious actor(s) can even bypass most MFA methods!
How malicious actors can easily impersonate your voice
Retrieval-based-Voice-Conversion (RVC) using Machine Learning AI is becomingly increasingly accurate. This will
EvilQR Phishing / QRLJacking
QR codes are designed for usability, not security. Using QRLJacking, a victim can unknowingly grant access to their account by scanning a QR code.
Evilginx – Bypassing MFA, phishing is back on the menu
MFA is secure… Unless it’s bypassed.
KeePass Master Password Exploit – CVE-2023-32784 – Proof Of Concept (POC)
Another day, another CVE. It is possible to recover the master password in cleartext for KeePass. Write up, examples and a POC to demonstrate CVE-2023-32784









