LOLBIN / LOLBAS – WinGet execute PowerShell script
I. Introduction In this article, I will provide a brief overview of the Windows Package Manager – WinGet. Following that, I will demonstrate how to…
I. Introduction In this article, I will provide a brief overview of the Windows Package Manager – WinGet. Following that, I will demonstrate how to…
A vulnerability in Redis in-memory store posed a critical risk for servers hosting the database. The vulnerability, identified as CVE-2025-49844 or RediShell, stemmed from a…
If you want to encrypt your Windows PC’s disk but you don’t want to store your recovery key with Microsoft, you do have options. We’ll…
Telegram: A crucial modern warfare channel Telegram, with its 700 million-plus-strong user base, has evolved into a pivotal communication hub for Hamas and Palestinian Islamic…
The story so far In Part 1, we learned that Impacket’s LDAP reconnaissance tools use OID-based filters that get transformed into bitwise operations in Event…
HTTP cookies often control critical website features, but their long and convoluted history exposes them to parser discrepancy vulnerabilities. In this post, I’ll explore some…
Ravie LakshmananMar 03, 2026Phishing / Malware Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional…
Aussie Broadband has completed the initial tranche of its internal cloud build and is progressively modernising workloads to run on it. Head of cloud and…
I. Introduction I will guide you through two methods on how to stop Defender that I have tested and successfully worked with the latest…
In tabletop exercises the company conducted in 2025, 88% of participants had trouble detecting threats, 94% had difficulty with containment, and 82% struggled to activate…
From the Department of Bizarre Anomalies: Microsoft has suppressed an unexplained anomaly on its network that was routing traffic destined to example.com—a domain reserved for…
From AI-powered vendors protecting email inboxes and web browsers, to providers of modern code security, here’s a look at 20 key companies in web, email…