InResponsible CyberbyTom PhilippeUsing Social Media and SaaS Platforms for Malicious Gain — SaaS-ational Command and ControlSaaS (Software as a Service) and cloud services have become increasingly popular in recent years for their convenience and ease of use…Mar 16, 2023Mar 16, 2023
InResponsible CyberbyTom PhilippePart II: SaaS-ational Command and Control — Using Social Media and SaaS Platforms for Malicious…In a previous article, we explained how cybercriminals make use of Social Media, SaaS platforms, or pretty much any service with an API to…Mar 20, 2023Mar 20, 2023
InInfoSec Write-upsbyTom PhilippePhishing 101: Bypassing 2FA like a proOne of the most common techniques used by hackers is phishing, which involves tricking people into giving away their personal information…Mar 26, 2023Mar 26, 2023
InThe Gray AreabyTom PhilippeDIY Rubber DuckyHack5’s Rubber Ducky is amazing but expensive. With 3$ and a bit of elbow grease, you can make your own.May 14, 20231May 14, 20231
InInfoSec Write-upsbyTom PhilippeBuilding a 30,000$ password cracking rig in the cloud for pennies.Leverage the Cloud to build a high performance on-demand password cracking rig for cents, with HashCloud.Jun 3, 20233Jun 3, 20233