Masters of Imitation: Cyber Deception
Introduction to Deception In my pentesting engagements, I’ve encountered various forms of deception used by threat actors. The art world has …
Technical articles, tutorials, and security insights.
Introduction to Deception In my pentesting engagements, I’ve encountered various forms of deception used by threat actors. The art world has …
Introduction to TA551 Botnet In my pentesting engagements, I’ve encountered various botnets, but the TA551 botnet is particularly notable due to …
Introduction to Pharos Mosaic Vulnerability In my pentesting engagements, I’ve encountered various control systems, including the Pharos …
Introduction to CISA KEV Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains a catalog of Known Exploited Vulnerabilities …
Introduction to Schneider Electric EcoStruxure Foxboro DCS In my pentesting engagements, I have encountered various industrial control systems (ICS), …
Introduction to the Breach In my pentesting engagements, I’ve seen numerous cases of sensitive data exposure due to inadequate security …
Introduction to TeamPCP and Kubernetes Attacks As a security engineer, I’ve been following the recent activities of the TeamPCP hacking group. …
Introduction to CVE-2025-32975 As a security engineer, I’ve been following the recent developments on the Quest KACE Systems Management …
Introduction to Ransomware Threats As a security engineer, I’ve encountered numerous ransomware attacks in my pentesting engagements. Recently, …
Introduction to Advanced Flow In my pentesting engagements, I’ve encountered numerous Android devices with insecurely configured sideloading …