Categories
Cybersecurity Tech Talk

What is credential stuffing, and why do I care?

Credential stuffing is when known passwords and usernames are used to try to take over online accounts. Recently an organization had almost 200,000 customer accounts compromised like this.

Learn more about it and what to do to protect yourself.

Categories
Cybersecurity Tech Talk

Amazon Scam Text Message – What Actually Happens When You Click?

Have you ever wondered what happens when you click on a link from one of thos Amazon text messages that say your account is suspended? Here I run through one of those so you understand what they are doing.

TLDR; They capture anything you put in the form, login info, social security number, credit card, whatever.

Do not try this at home – This was done from a secure computer that is resistant to viruses. Some of these links CAN try to infect your computer or phone.

Categories
Cybersecurity Quotes

Phishing-as-a-service platform ‘Robin Banks’ targets financial firms

I was fortunate to to be quoted in this article about the Phishing as a Service group ‘Robin Banks’. Check it out

https://www.scmagazine.com/analysis/email-security/phishing-as-a-service-platform-robin-banks-targets-financial-firms

Categories
Quotes

Microsoft Details How Phishing Campaign Bypassed MFA

I was quoted in this article. It’s always awesome to get quoted. 🙂

https://www.infosecurity-magazine.com/news/microsoft-phishing-campaign-mfa/

Categories
Quotes

Quoted in Hacker News – Microsoft Warns of Large-Scale AiTM Phishing Attacks Against Over 10,000 Organizations

Microsoft Warns of Large-Scale AiTM Phishing Attacks Against Over 10,000 Organizations

Categories
Quotes

This big phish can swim around MFA, says Microsoft Security

I was quoted in good ‘ol ‘El Reg today. It’s cool to see myself quoted on a page I read every morning as I started the day.

This big phish can swim around MFA, says Microsoft Security

Categories
Quotes

Large-Scale Phishing Campaign Bypasses MFA

I was quoted here about this MFA bypass technique

Categories
Cybersecurity Quotes

I Was Quoted in Dark Reading

It’s always cool to be quoted. This time it was about Microsoft 365 users and how they are being targeted by voicemail-themed phishing attacks.

https://www.darkreading.com/remote-workforce/microsoft-office-365-users-raging-spate-attacks

Categories
Cybersecurity Quotes

Quoted in TechRepublic About the Voicemail Phishing Attacks

Here is another publication that picked up my quote about Microsoft 365 credential phishing via phishes that appear to be realted to voicemails.

https://www.techrepublic.com/article/targeted-voicemail-phishing-attacks/

Categories
Uncategorized

I Was a Guest on the Layer 8 Podcast

Here is a link to the podcast I did with Patrick Laverty for the Layer 8 Podcast. Patrick also runs the annual Layer 8 Conference, which is focused on OSINT and social engineering. It’s a great conference that won’t break the bank. After listening to the podcast, check out the conference.

https://anchor.fm/layer-8-podcast/episodes/Episode-85-Erich-Kron—Phishing-As-A-Service-e1jmi3a/a-a82vh3l