You are here:
Device code phishing is nothing new. In fact it has been around for some years now. Despite the awesome capabilities of device code phishing, it is…
Readers of this blog probably know that I like to try NTLM relaying over all protocols possible! Relaying to Microsoft SQL (MSSQL) is known to work…
Internet of Things (IoT) and Operational Technology (OT) is an area that has grown strongly in recent years and is increasingly being used in the…
Nowadays, web developers rely mostly on well-established frameworks to develop their platform or web sites. These frameworks take care of many…
A journey into the discovery of privilege escalation vulnerabilities in the Lenovo Update process.
An intensive 5-day hands-on training about IT security.
Christian Feuchter identified a vulnerability in BeyondTrust Privileged Remote Access (PRA).
More blog posts