Komodo ConsultingThe Army Of The Headless BrowsersHow Facebook infrastructure can be used to perform DDoS.5 min read·Jun 29, 2022----
Komodo ConsultingFILELESS ADWARE VIA WEB PUSH NOTIFICATIONSOne push too far / part 14 min read·Jun 29, 2022----
Komodo ConsultingIs Macro Malware Dead?To answer the question, of whether this is the end of Macro Malware, we must go on a short journey:3 min read·Jun 21, 2022----
Komodo ConsultingYOUR W-2 FORM IS WANTED FOR PHISHINGTraditionally, tax season opens by the end of January and…W-2 Fraud Sample2 min read·May 28, 2022----
Komodo ConsultingTHE ARMY OF THE HEADLESS BROWSERSHow Facebook infrastructure can be used to perform DDoS.6 min read·May 28, 2022--1--1
Komodo ConsultingPlaying with Connected Files: a story of the mysterious behavior in Windows file-systemA while back, I was working on some offline HTML files using Microsoft’s Office Word for some side project. I simply created an empty file…4 min read·Apr 28, 2022----
Komodo ConsultingBypassing CrowdStrike in an enterprise production network [in 3 different ways]EDR solutions and specifically CrowdStrike Falcon are giving us a hard time recently. It seemed that no matter how covert we tried to be, a…7 min read·Apr 28, 2022--1--1
Komodo ConsultingWhat Are The Best Practices in Third-Party Risk Management?Check out the following best practices for third-party risk management:2 min read·Feb 21, 2022----
Komodo ConsultingWhat Are The Main Aims of Penetration Testing?Before deciding to go for a simulated attack on network infrastructure, it is better to know what it is actually meant for. Also, it is…2 min read·Feb 21, 2022----
Komodo ConsultingAn Accidental SSRF Honeypot in Google CalendarThis is a story of what both I and Google engineers considered to be an SSRF vulnerability in Google Calendar — but turned out to be some…5 min read·Feb 21, 2022----