Are there any documented cases of attackers using ‘Free Trials’ as an attack vector?

We live in an age where a lot of services are hosted in various cloud-based infrastructures. And a lot of these infrastructures are based around a “pay as you go model”. I.e. The more servers you spin up, the more database IO… Continue reading Are there any documented cases of attackers using ‘Free Trials’ as an attack vector?

If a vulnerability has no relevant attack vectors, is monitoring still legitimate for a company?

Today while reviewing vulnerability scan results with a colleague, we had a debate about what vulnerabilities can be considered “true or legitimate” and hence worthwhile to spend resources in monitoring. We had a differing op… Continue reading If a vulnerability has no relevant attack vectors, is monitoring still legitimate for a company?

Under which conditions can dllhost.exe spawn child process? | MITRE ATT&CK T1191

I was looking for conditions/circumstances under which Dllhost.exe can spawn a child process. I examined a huge quantity of event logs from various Windows system and didn’t come across any event in which Dllhost.exe spawns a child process… Continue reading Under which conditions can dllhost.exe spawn child process? | MITRE ATT&CK T1191

I believe I had a student pay someone in Africa to do their homework on a Google Doc due to a possible VBA script in Somalian?

So I have a student that is…ahem…unwilling to do their own work and I had an interesting situation that I was hoping I could get other’s perspectives on.

I assign the homework as a Google Doc that they make their own cop… Continue reading I believe I had a student pay someone in Africa to do their homework on a Google Doc due to a possible VBA script in Somalian?