Microsoft 365 Application IDs Microsoft 365 Application IDs

Microsoft 365 Application IDs – BEC Investigation Resources

This resource will be periodically updated as new findings occur. Last Updated: 27/01/2026. Malicious OAUTH Applications Application Name…
Wordpress Security Logo Wordpress Security Logo

WordPress Security in 2024: The LiteSpeed Cache Vulnerability

WordPress dominates the internet landscape, powering 43.5% of all websites – approximately 478 million sites worldwide. Its popularity…
Evil twin attack image Evil twin attack image

The Dangers of Public Wi-Fi Networks

In an alarming cyber security incident, an Australian man has been charged for conducting ‘evil twin’ Wi-Fi attacks…
XZ Utils Backdoor XZ Utils Backdoor

HTB: Business CTF – Mitigation Writeup

This forensics challenge was part of the HTB Business CTF 2024: The Vault of Hope. I found this…
Skull with locks around it Skull with locks around it

Black Basta’s Ransomware Reign: 500 Breaches and Counting

Black Basta, one of the most prominent ransomware operators, has recently been attributed to having breached over 500…