• Getting into Information Security.
    Note: this is consistently being updated and changed as much as I can, I may have gotten some thing wrong, if I have shoot me a DM over on Twitter @DoddsyLTD and I will be sure to correct it and take on any feedback you have. What is it you want to achieve? First and…
  • Maze Ransomware
    In late 2019 and early 2020 Maze Ransomware started its surge in attacks, but what is Maze ransomware, and how do they attack exactly? Maze Ransomware is a fairly recent concept in that it is an evolution of the “ChaCha” ransomware, but will also exfiltrate the data as well as encrypting it. By exfiltrating the…
  • Principles (reasons for effectiveness)
    Authority When a threat actor conveys authority as part of their social engineering, it could be from someone higher in the organisation or possibly IT, people tend to want to please their company and it makes it easier to get access or information from them. Intimidation Intimidation can be used by a social engineer in…
  • Types of Attacks
    • Social engineering Phishing Phishing is a method that attackers use in which they will send emails to a user, pretending to be from reputable companies, in order to get a user to either divulge information or assist the attacker in getting access. Spear phishing Spear Phishing is phishing attack but aimed with a specific…
  • Types of Malware
    Viruses Viruses are a specific piece of malware which replicates itself to further infect other devices, file systems and shares. It generally doesnt require anything to start the replication process, but usually requires some kind of execution to infect the host device. Crypto-malware Crypto-malware is a type of ransomware, which will encrypt all of the…