skip to Main Content

The Human Vulnerability Scan

The Human Vulnerability Scan Is a hacker more likely to perform elaborate attacks that require slow stealth scans, creation of custom scripts, and metered brute forcing attempts? Or is it more likely that they search for the easiest and quickest…

Read More

Don’t Get Out Your Bitcoin

Reports are circulating of another ransomware outbreak that started infecting in Russia and Ukraine on June 27th, 2017. A few businesses across the States have also been affected. Originally, the ransomware was thought to be Petya, which initially started infecting…

Read More
Cloud Hacking

i h4cked the Cl0ud

This is right! I did it! I Hacked the Cloud….. It was really difficult as there were a lot of motion monitoring heat sensors and Lasers that I had to breach before I could move into the cloud environment. As…

Read More

Let’s Go Whaling!

Some of my favorite past times are fishing and working phishing investigations. It seems like most typical Security Admins do not realize how important it is to protect the email server and the people it serves. This is not a…

Read More
Back To Top