Nation-states in the ransomware business

06/19/2017 Nation-states in the ransomware business Issue Nation states are now confirmed to be using ransomware campaigns to fund state coffers.   British National Cyber Security Center (NCSC) reported this week that the WannaCry ransomware attack was launched from...

Powershell scripts execute in Powerpoint without macros

Powershell scripts execute in Powerpoint without macros Issue Microsoft’s powerful native scripting language, Powershell, is able to execute inside a Powerpoint presentation without using macros.  This presents an issue for many organizations that rely on blocking...
Make your Tastic Fan-Tastic

Make your Tastic Fan-Tastic

Here at InGuardians, we are huge fans of the Tastic HiD card long-range reader. Designed and implemented by Bishop Fox, this long-range RFID reader allows us to silently and stealthily acquire sensitive data from things like employee badges, and has become a huge...
Radio Communication Analysis using RfCat

Radio Communication Analysis using RfCat

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 15 Oct 2013 Many people think RfCat is a very cool concept. The thought of monitoring and interacting with sub-gigahertz radio is very sexy. Hell, it IS sexy. Then people get an IM-ME, a...