
Dark Duckie Hotel Demo
Your Adobe Reader Needs Updating
Your version of Adobe Reader is outdated. To ensure the best experience and security, please update to the latest version.
Update Adobe Reader NowYour version of Adobe Reader is outdated. To ensure the best experience and security, please update to the latest version.
Update Adobe Reader NowThis weekend I was running a workshop with my awesome friend James, where we were discussing the realities of wireless network security, man in the middle attacks and what we have found in the field, both from an offensive perspective and as corporate network defenders. As with all things in life, sometime reality doesn’t work quite as well as a demo! So I’ve done a quick thread on twitter showing the kill chain an adversary can deploy when attacking WPA2 PSK (without PMF enforced) networks. This is written as a twitter thread so bear with the style!
Read more “Breaching WPA2 PSK Wireless Networks” →Recently the Online Safety Act (OSA) has come into force, now regardless of your opinion on this, I wanted to look at some things that exist today when considering children’s mobile phone access.
When you setup an iPhone or Android phone for use by a child, you have to complete KYC with Apple and Google using an adult account which is verified by credit card/debit card.
So to get an account as a child you need the parent to set this up, link the account to the parents account and pass an element of KYC/verification including a 0 fee payment check.
What we found during recent testing is that Safe Search is enforced by default on children’s <13yo accounts. However we found that a some things that were a bit surprising.
Read more “Won’t someone think of the children!” →The U.S. bombing of Iranian nuclear facilities on June 22, 2025, alongside Israel’s ongoing military campaign, marks a significant escalation in the Middle East conflict. While these airstrikes target Iran’s nuclear capabilities, they are unlikely to alter the broader cyber threat landscape, which remains dominated by cybercriminals exploiting systemic weaknesses in global digital security. This blog explores why these high-profile military actions, though geopolitically significant, won’t address the entrenched issues fueling cyber threats.
Read more “Why U.S. and Israeli Airstrikes on Iran Won’t Shift the Cyber Threat Landscape” →In my travels I have found it matters more how you do IT securely than how you ‘do security’. What I mean by this is, the prevailing themes of orgs recently is to bolt on SOCs/MDR and other services to a low maturity/low capability IT organisations with the hope that its magic’s all the security problems away. This sounds lovely, the salespeople will almost certainly productise your security improvement journey and make it sound like a dream.
Read more “Bolting on security does not work” →In the world of cybersecurity, the term Security Operations Center (SOC) carries significant weight. It evokes images of highly skilled analysts working around the clock to detect, respond to, and mitigate cyber threats. However, not all SOCs live up to this expectation. If a SOC lacks core functions like triage, analysis, assessment, and remedial action, it’s not truly a SOC—it’s merely a contact center masquerading as one. Let’s explore why these functions are non-negotiable for a SOC and why their absence undermines the entire purpose of cybersecurity operations.
Read more “Why a SOC Without Triage, Analysis, and Remediation Is Just a Contact Center” →As part of my Cyber SOC GitHub repo I’ve put together lots of resources to try and help people with some common cyber security tasks, applicable to CISOs through to SOC analysts.
I also want to highlight one of the most common incident types if you are an Office 365 customer is a business email compromise scenario, so I’ve put together a high level view of the steps you might want to take after a BEC event is discovered:
Read more “Business Email Compromise Check List” →If you are are a victim of unauthorised mailbox access and/or attempted fraud via mailbox compromise (BEC) then you know that one of the tasks outside of understanding how the compromise has occurred, what configurations have been tampered with, removing devices and resetting usernames/passwords (and tokens/MFA) etc. is to start to understand the data breach impact.
If someone has logged into a mailbox it’s very very unlikely that zero data has been accessed!
Ok with my AI companion GROK I’ve gone exploring on the differences between Japan’s new cyber laws and the UK! This is more GROK than me, but I thought people might find this interesting!
Read more “Japan goes on the Cyber Offensive” →I’m back with my AI enabled self! This evening I’m jumping into some interesting things about WIFI probes! Now back in the day you could deploy a pineapple etc. can you would hear phones calling out all the time for SSIDs to connect to, you could fingerprint phones (and infer people) from them!
But that’s not really the case anymore! If we camp with a pineapple or other setup, it’s not really the same anymore! (unless someone has a hidden SSID… they are terrible for PERSEC/OPSEC!!)
Want to know why? Well it’s down to how phones are programmed to poll (probe) for SSIDs… I’ve tested this in a car park miles away with a range of kit! (not dodgy at all right!)
To help me answer this I turned to my currently favourite LLM: GROK
Read more “Wifi, Iphones and Persec/Opsec” →