Microsoft 365 Application IDs Microsoft 365 Application IDs

Microsoft 365 Application IDs – BEC Investigation Resources

This resource will be periodically updated as new findings occur. Malicious OAUTH Applications Application Name Application ID Comments…
Wordpress Security Logo Wordpress Security Logo

WordPress Security in 2024: The LiteSpeed Cache Vulnerability

WordPress dominates the internet landscape, powering 43.5% of all websites – approximately 478 million sites worldwide. Its popularity…
Evil twin attack image Evil twin attack image

The Dangers of Public Wi-Fi Networks

In an alarming cyber security incident, an Australian man has been charged for conducting ‘evil twin’ Wi-Fi attacks…
XZ Utils Backdoor XZ Utils Backdoor

HTB: Business CTF – Mitigation Writeup

This forensics challenge was part of the HTB Business CTF 2024: The Vault of Hope. I found this…
Skull with locks around it Skull with locks around it

Black Basta’s Ransomware Reign: 500 Breaches and Counting

Black Basta, one of the most prominent ransomware operators, has recently been attributed to having breached over 500…