Mike VarleyLeveraging Fear and Uncertainty: The Art of Social Engineering AttacksIn the world of cyber security, attackers are constantly evolving their tactics to breach systems and gain unauthorized access to sensitive…Oct 1, 2023Oct 1, 2023
Mike VarleyUnraveling the Mind Games: How Cognitive Biases Fuel Social Engineering Attacks — Authority BiasIn the ever-evolving landscape of cyber security threats, social engineering attacks remain a persistent and potent danger. Unlike…Oct 1, 2023Oct 1, 2023
Mike VarleyUnderstanding the Psychology Behind Social Engineering AttacksOctober marks European Cyber Security Awareness Month, a crucial initiative that reminds us of the ever-growing significance of…Oct 1, 2023Oct 1, 2023
Mike VarleyCVE-2022–30190 (Follina) Testing & DetectionBack in June CVE-2022–30190 (more commonly known as Follina) hit the headlines as adversaries weaponised malicious email attachments to…Oct 11, 2022Oct 11, 2022
Mike VarleyFixing the Zeek Add-on for Splunk in DetectionLabI’ve recently joined a group of like-minded threat enthusiasts that has compelled me to finally bit the bullet and buy a homelab. Like, a…Apr 11, 2022Apr 11, 2022
Mike VarleyCybersmelting Minerals: Following CobaltStrikeA friend of mine reached out recently to let me know of this cool tool from none other than Splunk themselves, called Melting Cobalt…Nov 23, 2021Nov 23, 2021
Mike VarleyBuilding Detection Lab in AzureA recent engagement has had a colleague and myself in desperate want of a testing environment, where we can hone our hunting & detection…Nov 1, 2021Nov 1, 2021
Mike VarleyinAdarma Tech BlogDetecting Account Compromise through Land Speed Violations OR How Highschool Maths Help Catch Bad…I’m Mike, and I’m a Security Consultant with Adarma. One of my principle responsibilities is to work with some of the UK’s (and world’s)…Jan 5, 2021Jan 5, 2021