Welcome! Recently I've been pretty busy settling into a new role performing web application penetration testing and I thought I'd go over a...
The past two macOS samples I've looked at (Poseidon and Atomic Stealer) have heavily utilized AppleScript for their functionality. While looking at t...
I've been exploring the world of macOS malware analysis, and as a newbie I wanted some more samples to practice on. This prompted me to head over to ...
Ephemeral Sites & InfrastructureEphemeral: lasting a very short time; short-lived; transitory:The nature of malicious sites and infrastructure leads ...
Recently I've been reached out to two different parties on Twitter via DMs. Both advertising jobs, ranging from marketers, to ambassadors, to blockch...
OverviewOn July 12th 2024 a security advisory was published by SEAL regarding the recent Squarespace domain hijacking security incidents. The advisor...
So You Want to Write an ERCBy: jtriley.eth - Article LinkFirst off, a good question is: What is an ERC?An Ethereum Request for Comment (ERC) is a for...
@Jon_HQ wrote a great guide on performing incident response for a Discord server and I'm attempting to compile this information in one big handy guid...
Recently a post on Twitter by @optimizoor blew up about him still using the MacBook Air 11" featured here:And I thought it was absolutely phenomenal,...
If you've been keeping up with the Web3 security space on social media, you'll know it can get a bit hectic. Thousands of posts rolling through every...