Exploiting Vulnerable Drivers Post date April 29, 2026 Post author By ericlaw Post categories In Defender, InfoSecTTP, security
Attack Techniques: RMM Abuse Post date April 24, 2026 Post author By ericlaw Post categories In InfoSecTTP, security
AI Injection Attacks Post date September 5, 2025 Post author By ericlaw Post categories In ai, design, InfoSecTTP, security, web
Attack Techniques: Fake Literally Everything! Post date April 24, 2025 Post author By ericlaw Post categories In InfoSecTTP, osint, scam, security, SmartScreen, tech, web
Vibe-coding for security Post date April 15, 2025 Post author By ericlaw Post categories In ai, dev, InfoSecTTP, security
Defensive Technology: Exploit Protection Post date April 1, 2025 Post author By ericlaw Post categories In dev, InfoSecTTP, security
Defensive Technology: Windows Filtering Platform Post date March 31, 2025 Post author By ericlaw Post categories In dev, InfoSecTTP, Network Protection, networking, security, tech
Attack Techniques: “I Already Hacked You” Scams Post date February 20, 2025 Post author By ericlaw Post categories In InfoSecTTP, scam, security, web
Security Software – An Overview Post date November 18, 2024 Post author By ericlaw Post categories In Defender, design, InfoSecTTP, security, tech
Defensive Technology: Controlled Folder Access Post date November 15, 2024 Post author By ericlaw Post categories In Defender, InfoSecTTP, security, tech, Windows
Defensive Technology: Antimalware Scan Interface (AMSI) Post date October 25, 2024 Post author By ericlaw Post categories In Defender, InfoSecTTP, malware, security, tech
Attack Techniques: Encrypted Archives Post date October 2, 2024 Post author By ericlaw Post categories In browsers, InfoSecTTP, malware, security, SmartScreen, web, zip
Attack Techniques: PayPal Invoice Scams Post date June 5, 2024 Post author By ericlaw Post categories In InfoSecTTP, phishing, security, web
Attack Techniques: Trojaned Clipboard Post date June 4, 2024 Post author By ericlaw Post categories In clipboard, InfoSecTTP, MoTW, security, web, zones
Attack Techniques: Trojaned Clipboard Post date June 4, 2024 Post author By ericlaw Post categories In clipboard, InfoSecTTP, MoTW, security, web, zones
Attack Techniques: Remote Control Software Post date May 21, 2024 Post author By ericlaw Post categories In InfoSecTTP, security, web
Attack Techniques: Full-Trust Script Downloads Post date May 20, 2024 Post author By ericlaw Post categories In InfoSecTTP, malware, security
Attack Techniques: Spoofing via UserInfo Post date March 22, 2023 Post author By ericlaw Post categories In authentication, InfoSecTTP, passwords, phishing, security, URIs, web
Attack Techniques: Open Redirectors, CAPTCHAs, Site Proxies, and IPFS, oh my Post date March 16, 2023 Post author By ericlaw Post categories In InfoSecTTP, phishing, security, SmartScreen, tech, web
Attack Techniques: Blended Attacks via Phone Post date February 9, 2023 Post author By ericlaw Post categories In InfoSecTTP, phishing, security, web
Defense Techniques: Reporting Phish Post date January 19, 2023 Post author By ericlaw Post categories In browsers, InfoSecTTP, phishing, security, web
Attack Techniques: Priming Attacks on Legitimate Sites Post date January 11, 2023 Post author By ericlaw Post categories In InfoSecTTP, phishing, security, web
Attack Techniques: Phishing via Mailto Post date January 11, 2023 Post author By ericlaw Post categories In InfoSecTTP, phishing, security, web
Attack Techniques: Phishing via Local Files Post date January 11, 2023 Post author By ericlaw Post categories In auth, authentication, browsers, InfoSecTTP, Passkeys, passwords, phishing, security, web