New or Evolved Phishing Kit: An AiTM Attribution Case Study

Phish Tales #10 — Part 2 Following up on Part 1, where I dissected a targeted AiTM attack against my organization — seven redirect hops, a fake Microsoft Defender portal, and an ASP.NET Core reverse proxy of Microsoft 365 login — this part covers the attribution effort: a systematic elimination of known PhaaS kits against the Sekoia 2025 Global Analysis of Adversary-in-the-Middle … Read more

Kali Linux Meets Claude AI: Is Natural Language Pentesting going to make a difference?

Kali Linux Meets Claude AI: Natural Language Pentesting Cybersecurity just got a massive upgrade. Just a few days ago, the Kali Linux development team officially announced a native AI-assisted penetration testing workflow. By integrating Anthropic’s Claude AI via the open-source Model Context Protocol (MCP), security professionals can now ditch complex command syntax and run advanced … Read more

The path to the core

What can be done at the application level? Execute an unprivileged processor command, access a user memory cell, or make a system call. That’s it. Writing to I/O ports, reprogramming the BIOS, masking processes and network connections — all of this is only possible at the kernel level. That is why many security researchers strive to get … Read more

❤️ Help Fight Human Trafficking
Support Larry Cameron's mission — 20,000+ victims rescued