top of page



Understanding and Defending Against CVE-2024-38063: A Critical IPv6 Vulnerability in Windows
Introduction CVE-2024-38063, a critical vulnerability in the Windows TCP/IP stack, has garnered significant attention in the...

Chris Coulombe
Sep 25, 20244 min read
57 views


The Rise and Fall of the 911 S5 Botnet: A Case Study in Cybercrime
The recent dismantling of the 911 S5 botnet marks a significant victory in the ongoing battle against cybercrime. Operated by 36-year-old...

Chris Coulombe
Jun 2, 20243 min read
33 views
0 comments


The Psychology of Social Engineering: Why It Works and How to Protect Yourself
Social engineering is a term that has gained significant traction in the cybersecurity world. It refers to the psychological manipulation...

Chris Coulombe
May 23, 20246 min read
47 views
0 comments


The Psychology of Being a Hacker: Understanding the Motivations Behind Cybercrime
In the digital age, hacking has emerged as a complex and multifaceted phenomenon. From white hat hackers who strive to protect systems to...

Chris Coulombe
May 23, 20247 min read
102 views
0 comments


Harvard's Quantum Network: A New Era in Cybersecurity
Physicists at Harvard University have achieved a groundbreaking milestone in cybersecurity by developing what they claim to be the...

Chris Coulombe
May 18, 20243 min read
13 views
0 comments


Exploring the Security Risks of Neuralink and Other Medical IoT Devices
Neuralink, a brain-computer interface (BCI) startup founded by Elon Musk, has made significant advancements in neuroscience and...

Chris Coulombe
May 12, 20243 min read
28 views
0 comments


Extensive Review of the Cyber Attack on Ascension Healthcare: Lessons and Proactive Measures
Introduction The recent cyber attack on Ascension Healthcare through its third-party vendor, ConsensioHealth, has cast a spotlight on the...

Chris Coulombe
May 10, 20243 min read
20 views
0 comments


The Dark Side of AI in Cybersecurity: Empowering Cybercriminals and Expanding Threat Landscapes
The rapid advancements in Artificial Intelligence (AI) have heralded new frontiers in cybersecurity, promising enhanced protective...

Chris Coulombe
May 9, 20243 min read
22 views
0 comments


Disruption of LockBit Ransomware: A Turning Point or a Temporary Setback?
The recent disruption of LockBit, one of the most prolific ransomware groups globally, marks a significant moment in the ongoing battle...

Chris Coulombe
May 8, 20243 min read
13 views
0 comments


Analyzing CVE-2024-23897: A Critical Vulnerability in Jenkins
CVE-2024-23897 represents a significant security threat within Jenkins, an open-source automation server integral to continuous...

Chris Coulombe
May 6, 20243 min read
38 views
0 comments


CVE-2024-3400: An In-Depth Analysis from the Front Lines of Cybersecurity
The discovery and subsequent exploitation of CVE-2024-3400, a critical vulnerability in Palo Alto Networks’ PAN-OS operating system,...

Chris Coulombe
May 4, 20243 min read
33 views
0 comments


Physical Pentesting OMG Cable
In the following video I demonstrate the use of an OMG cable deploying the hoax shell PowerShell Payload. References:...

Chris Coulombe
Nov 7, 20221 min read
31 views
0 comments


Physical Pentesting with USB/OMG plug
I thought it would be interesting to deploy the hoax shell PowerShell payload via the omg cable. In the following video this is exactly...

Chris Coulombe
Nov 7, 20221 min read
29 views
0 comments


o365 Business Premium account MFA bypass
I setup a Debian 10 server on Linode to host Evilginx where I was able to successfully initiate a man-in-the-middle attack to steal the...

Chris Coulombe
Nov 3, 20221 min read
82 views
0 comments


Token Impersonation From Nessus Credentialed Scan
In the above video I demonstrate how I'm able to get domain admin from token impersonation of a credentialed Nessus scan. I start by...

Chris Coulombe
Nov 3, 20221 min read
42 views
0 comments
bottom of page