C:\Users\mr.d0x> whoami_
Analyzing Cortex XDR and finding ways to bypass it
Continue Reading →ForcePoint One DLP EndPoint lacks tamper protection allowing attackers to disable the product, raise privileges and establish persistence on the machine
Continue Reading →This article explores a phishing technique that simulates a browser window within the browser to spoof a legitimate domain
Continue Reading →Steal credentials and bypass 2FA by giving users remote access to your server via an HTML5 VNC client that has a browser running in kiosk mode
Continue Reading →This is the start of a Twitter recap series which highlights interesting or useful posts that never made it to the blog
Continue Reading →Abuse the way O365 Outlook renders cloud attachments to make malicious executable cloud attachments look like harmless files
Continue Reading →UPDATED: With the announcment that MS Teams allows users outside of an organization to message users, I revisited Teams and added new techniques
Continue Reading →Google Drive’s email file functionality can be used to send phishing emails via the google.com domain
Continue Reading →A new technique showing how an attacker can create calendar invites with spoofed attendees
Continue Reading →Simple changes in process relationship could bypass certain security solutions
Continue Reading →