Beginner’s Guide to Pentesting IoT Architecture/Network and Setting Up IoT Pentesting Lab – Part 1

Beginner’s Guide to Pentesting IoT Architecture/Network and Setting Up IoT Pentesting Lab – Part 1

In this post, I will explain how to pentest an IoT Network/Architecture. Also, I will explain how to set up an IoT Pentesting lab for getting started with IoT Pentesting. Since the ...
ZeroFont phishing attack image

ZeroFont Phishing Attack Bypasses Office 365 Security

A new dangerous hacker tactic has been identified as the ZeroFont phishing attack which is responsible for infections caused by Office 365 manipulation. This is done by using social engineering tactics that ...
Clustering App Attacks with Machine Learning Part 3: Algorithm Results

Clustering App Attacks with Machine Learning Part 3: Algorithm Results

In the previous blog posts in this series, we discussed the motivation for clustering attacks and the data used and how to calculate the distance between two attacks using different methods on ...
Office 365™ Integration with Identity Management

Office 365™ Integration with Identity Management

Organizations are moving to Microsoft® Office 365™ en masse. Microsoft is pushing everybody to be a customer of their cloud productivity platform, but as we all know, you can still use the ...
Is Okta Open Source?

Is Okta®️ Open Source?

Let’s cut to the chase—Is Okta® open source? As stated on OpenSource.com, “the term ‘open source’ refers to something people can modify and share because its design is publicly accessible.” So, the ...
Gaining Shell Access via UART Interface Part 3

Gaining Shell Access via UART Interface Part 3

This is the 3rd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first two parts. If not, please go through them. In this part, I will explain how I ...

Gaining Shell Access via UART Interface Part 2

This is the 2nd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first part. If not, please go through it. In this post, I will cover Baud Rate, lab ...

Gaining Shell Access via UART Interface Part 1

What is IoT The Internet of Things (IoT) is the network of physical devices, vehicles, home, appliances, vehicle, and other items embedded with electronics, software, sensors, actuators, and... Go on to the ...
Cupertino Code Signing, The Next Generation (Maybe It'll Work)

Cupertino Code Signing, The Next Generation (Maybe It’ll Work)

via Josh Pitts (a staff engineer at OKTA), and writing on the company blog, comes a well crafted explanatory piece on what he has discovered in the third-party-code-signing Apple Inc. (NasdaqGS: AAPL) ...
Microsoft Fixes 11 Critical Flaws, Readies Patches for Spectre Variant 4

Microsoft Fixes 11 Critical Flaws, Readies Patches for Spectre Variant 4

Microsoft has fixed 50 vulnerabilities in its products during this month’s Patch Tuesday, 11 of which are rated critical. The company has also released mitigation for the new Spectre variant announced last ...
Security Boulevard
Loading...