The Most Wonderful (and Risky) Time of the Year For most retailers, the holiday period represents the peak of the business calendar – a time when transactions soar, new promotions launch daily, and digital infrastructure runs hot. Unfortunately, threat actors also know this and as retail teams focus on customer Continue Reading
Pivot, Pivot! Using Open-Source Data to Support Shared Intelligence
Introduction: The Art of the Pivot In threat intelligence, the difference between a collection of indicators and a coherent threat picture often comes down to one skill: pivoting. Pivoting is the process of following digital breadcrumbs – domains to IP addresses, hashes to infrastructure, alias to forum post, following the Continue Reading
No Pain, No Gain! Introducing the Pyramid of Pain
Estimated difficulty: 💜💜🤍🤍🤍 A nice quick read this month as we talk about the Cyber Threat Intelligence model the Pyramid of Pain. A long, long, time ago (2013) in a land far, far, away (the United States), David J. Bianco developed the Pyramid of Pain as a conceptual model to Continue Reading
Untangling the Web: An Introduction to the OWASP Top 10
Estimated difficulty: 💜💜🤍🤍🤍 We are back! And what better way to kick things off than a joint blog post from both Sarah & Sophia? Despite our now varying areas of specialty, we’ve gone back to our penetration testing routes and will be covering the current OWASP Top 10 for web Continue Reading
Under ATT&CK: An introduction to MITRE ATT&CK
Estimated difficulty: 💜💜🤍🤍🤍 Welcome to another blog focusing on my journey into Threat Intelligence, this time introducing the MITRE ATT&CK framework and the concept of Tactic, Techniques and Procedures (TTPs). What are TTPs? Tactics, Techniques and Procedures are used to identify the methods or patterns of activity that are used Continue Reading
It’s the (Threat Intelligence) Circle of Life
Estimated difficulty: 💜🤍🤍🤍🤍 As some of you may now know, I’ve recently switched to the (potentially dark?) side of Cyber Threat Intelligence (CTI). Don’t worry, I’ll still be doing car hax – but also have a new found love for all things threat intelligence and open-source (OSINT)! As I start Continue Reading
Text Me When You Get Pwned: What is SMShing and How Do I Protect Myself?
Estimated difficulty: 💜🤍🤍🤍🤍 What is SMShing? SMShing (AKA Smishing) is a type of social engineering attack conducted over text messages, also known as SMS phishing. Social engineering attacks rely on exploiting human behaviour and reaction rather than a technical vulnerability. Criminals who “SMSh” or “phish” are usually financially motivated, using Continue Reading
Typo-What?! How Attackers Use Typo-squatting to Lure You to Dodgy Websites
Estimated difficulty: 💜🤍🤍🤍🤍 New year, new blog post… obviously! To kick things of in 2023, today we’ll be talking about a commonly used social engineering technique called typo-squatting and how you can identify malicious domains/websites to protect yourself, or how to protect your organisation or brand if you own a Continue Reading
The Importance of Not Doing Work: Avoiding Burnout Part Two
So in hindsight this title is a tad misleading, I’m definitely not suggesting to drop all your job responsibilities in a blink of an eye…! But rather evaluate your work/life balance to ensure you’re prioritising your mental health above all – as of course, you should always be your first Continue Reading
XXE Injection: To Entity and Beyond!
Estimated difficulty: 💜💜💜💜🤍 Welcome back readers! After a few months hiatus, the Queens are back in action and ready to blog to our heart’s content! This month’s blog we will be delving into the art of XXE injection, what it is, a few ways to exploit it, and the mitigation Continue Reading