Waylon GrangeinStage 2 SecurityCan solar controllers be used to generate fake clean energy credits?Last year I found myself with a little more free time on my hands but nowhere to go. I decided to use that time to look around my home for…May 17, 20211May 17, 20211
Waylon GrangeinStage 2 SecurityFighting fire with fire, exploits against OilRig’s tool kitThe term Advanced Persistent Threat (APT) has always bothered me. It feels like a term with no meaning. Original used by the US Air Force…Sep 30, 20201Sep 30, 20201
Waylon GrangeinStage 2 SecurityAWS API Gateway fronting for Command and ControlOften during pen-testing engagements we run into clients who utilize IP blacklists or IP whitelists to filter outbound communications…Sep 8, 2020Sep 8, 2020
Waylon GrangeinStage 2 SecurityAnchor_dns malware family goes cross platformThe actor’s behind Trickbot, a high profile banking trojan, have recently developed a Linux port of their new DNS command and control tool…Jul 13, 20202Jul 13, 20202