This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one […] ...
Building a Hardware Hacking Arsenal: The Right Bits for Every Byte

Building a Hardware Hacking Arsenal: The Right Bits for Every Byte

In our last IoT blog post we dove headfirst into IoT Security Assessments with a crash course in the methodology […] ...
How Hackers Steal Your RFID Cards

How Hackers Steal Your RFID Cards

Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...
How to Make Adversaries Cry: Part 1

How to Make Adversaries Cry: Part 1

In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...
The Art of Self-Defense: Security Validation Through Attack Simulation

The Art of Self-Defense: Security Validation Through Attack Simulation

Additional authors: Nic Finn Setting the Stage Organizations looking to develop an increasingly proactive defensive strategy are beginning to incorporate […] ...
Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques

Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques

NTLM (NT LAN Manager) relaying is an attack technique that has been around for years yet is still incredibly effective.  […] ...
SCCM Exploitation: Compromising Network Access Accounts 

SCCM Exploitation: Compromising Network Access Accounts 

Authors: Marshall Price and Connor Dowling TL;DR: SCCM Network Access Accounts (NAA) are frequently used despite being associated with several […] ...
A Crash Course in Hardware Hacking Methodology: The Ones and Zeros

A Crash Course in Hardware Hacking Methodology: The Ones and Zeros

Author: Nathan Keys The Internet-of-Things (IoT) has quickly and seamlessly become woven into the fabric of our daily existence. With […] ...