Phishing Email For Success – Part 4
Welcome to part 4, my Phishing friends. Thanks for returning to our Phishing For Success series! As you probably know by now, I’m a Senior Threat Emulation Specialist here at […]
Welcome to part 4, my Phishing friends. Thanks for returning to our Phishing For Success series! As you probably know by now, I’m a Senior Threat Emulation Specialist here at […]
Updating Your Flipper Zero: A Guide to Firmware Updates (RogueMaster Edition) NOTE: Flipper Fanclub Part 1 is located here! The Flipper Zero is a powerful and versatile device, but like […]
UPDATE: This blog post was written prior to the USB explosive incident in Ecuador. Some edits have been made to note these events. DISCLAIMER* The following blog post describes a […]
I was recently combing through GitHub for a tool that I tend to use on mobile application penetration tests when I came across APKLeaks. I currently make use of Mobile […]
White Oak Security discovered a “Zip Slip” Authenticated Remote Code Execution vulnerability in Frevvo Live Forms. Frevvo Live Forms is a workflow automation software used to automate processes and forms. […]
On a recent web application penetration test, I identified a classic server-side request forgery (SSRF) vulnerability that used a Denylist in an attempt to prevent active exploitation. This post details […]
Welcome to this post in the Interview With A Pentester blog series! We will interview a White Oak Security expert to discuss what is a penetration tester, how this cybersecurity […]
When I first came to White Oak Security, I was presented with a unique opportunity to do some training for threat hunting assessments. Prior to that point, I had some […]
Today in our Interview With A Pentester blog series, we deep dive into the mind of White Oak Security’s cyber security mentor. In this post, it is evident that Tib3rius […]
LoRa Frequency The Internet of Things (IoT) has revolutionized the way we live and work, connecting an ever-growing number of devices and systems to the internet. One key technology that […]