How to setup custom TLS for Gophish Landing Page
How to setup custom TLS and DNS for GoPhish dashboard Introduction f you’re using GoPhish for phishing simulations, you might already have a custom domain name and TLS certificate set up for your dashboard. But what about your landing page? It’s equally important to have a valid certificate on your landing page to ensure the […]
How to Set Up a Custom Domain Name and TLS Certificate for Gophish on AWS
How to Set Up a Custom Domain Name and TLS Certificate for Gophish on AWS Setting up a custom domain name and a TLS certificate for Gophish on AWS can enhance the professionalism and security of your phishing simulations. Follow these steps to configure your Gophish instance with a custom domain and TLS certificate. Step […]
LockBit Leader Identity Revealed – Legitimate or Troll?
LockBit Leader Identity Revealed – Legitimate or Troll? Widely recognised as one of the most prolific ransomware groups in the world, Lockbit first surfaced in 2019 as ABCD ransomware. Since first detected, the ‘ransomware-as-a-service’ group has released two major updates to the ransomware. The gang was credited for nearly 21% of all ransomware attacks in […]
How to Remove Metadata from a File
How to Remove Metadata from a File Introduction Metadata, often described as “data about data,” is information that provides details about a particular file. It can offer insights into various aspects of the file, such as its creation date, author, location, and more. While metadata serves various purposes, it can also pose privacy and security […]
Bypassing Internet Censorship with TOR
Bypassing Internet Censorship with TOR Introduction In a world where access to information is increasingly regulated, tools like the Tor network have become crucial for maintaining digital freedom. However, in some regions, internet service providers (ISPs) or governmental bodies may actively block access to TOR, hindering users’ ability to bypass censorship. In this article, we’ll […]
Kobold Letters: HTML-based Email Phishing Attacks
Kobold Letters: HTML-based Email Phishing Attacks On March 31st 2024, Luta Security released an article shedding light on a new sophisticated phishing vector, Kobold Letters. Unlike traditional phishing attempts, which rely on deceptive messaging to lure victims into divulging sensitive information, this variant exploits HTML’s flexibility to embed concealed content within emails. Dubbed “coal letters” […]