DeepFakes: How attackers are weaponising real-time face swapping
Deepfakes have evolved from niche internet curiosities into real-world weapons. From fake job interviews andn romance schemes to impersonating public figures in crypto scams, Deep Fakes are only becoming more of a problem. This blog is designed to cover the tactics, real-world cases, and why seeing shouldn’t mean believing anymore.
Honeypot – stats after 1 day
Honeypot Day 1 statistics… Let’s find out who’s being cheeky hackers.
How to protect against modern phishing attacks like Evilginx
Phishing attacks are wreaking havoc across businesses - Using modern phishing techniques, malicious actor(s) can even bypass most MFA methods!
How malicious actors can easily impersonate your voice
Retrieval-based-Voice-Conversion (RVC) using Machine Learning AI is becomingly increasingly accurate. This will
How to check User and Shared Mailbox Forwards in O365
How to use powershell to search user mailbox and shared mailbox forwards within your tenant for security purposes.
EvilQR Phishing / QRLJacking
QR codes are designed for usability, not security. Using QRLJacking, a victim can unknowingly grant access to their account by scanning a QR code.
Evilginx – Bypassing MFA, phishing is back on the menu
MFA is secure… Unless it’s bypassed.
KeePass Master Password Exploit – CVE-2023-32784 – Proof Of Concept (POC)
Another day, another CVE. It is possible to recover the master password in cleartext for KeePass. Write up, examples and a POC to demonstrate CVE-2023-32784
How to check Shared mailbox’s Access Rights via Powershell
How to check Shared mailbox’s Access Rights via .csv with Powershell. Useful for checking permissions without having to go through the office.com admin/exchange interface.