Luke Jennings (@jukelennings) 's Twitter Profile
Luke Jennings

@jukelennings

VP, R&D at @pushsecurity

ID: 838853726341300226

calendar_today06-03-2017 20:48:08

420 Tweet

1,1K Followers

420 Following

Luke Jennings (@jukelennings) 's Twitter Profile Photo

I wrote a blog post on the many defense mechanisms phishing kits are using to avoid discovery and analysis now. I used a recent instance of NakedPages and cover 9 different techniques, including Cloudflare Workers and Turnstile abuse. IOCs included. pushsecurity.com/blog/how-aitm-…

Kuba Gretzky (@mrgretzky) 's Twitter Profile Photo

I am filled with pride & joy having heard Evilginx compared to Cobalt Strike, on the latest episode of Risky Business. Huge thank you to Luke Jennings from @pushsecurity for making this bold statement (and for pronouncing Evilginx properly! 😜) Sorry, I could not help myself 😆

Luke Jennings (@jukelennings) 's Twitter Profile Photo

This week was my first time attending MSSN CTRL. It’s been a great conference and wow what a memorable view from the venue! Thanks for inviting me LimaCharlie!

This week was my first time attending MSSN CTRL. 

It’s been a great conference and wow what a memorable view from the venue! 

Thanks for inviting me <a href="/limacharlieio/">LimaCharlie</a>!
Luke Jennings (@jukelennings) 's Twitter Profile Photo

Interested in security research? Fascinated by the new era of identity attacks? Come join my team! Must be US-based, but it's 100% remote. pushsecurity.bamboohr.com/careers/74?sou…

Luke Jennings (@jukelennings) 's Twitter Profile Photo

Back by popular demand, I wrote a second part blog post on the many defense mechanisms phishing kits are using to avoid detection. This second part dives deep on one specific strategy - preventing detection of commonly cloned login pages e.g. Microsoft pushsecurity.com/blog/how-aitm-…

Luke Jennings (@jukelennings) 's Twitter Profile Photo

Someone is using Evilginx to target customers of Onfido, part of Entrust, with a malicious Google advert that comes above the legitimate Onfido advert 🤯 Yes that us[.]com domain is actually an evilginx server - guess which advert is the malicious one

Someone is using Evilginx to target customers of Onfido, part of Entrust, with a malicious Google advert that comes above the legitimate Onfido advert 🤯

Yes that us[.]com domain is actually an evilginx server - guess which advert is the malicious one
nick.eth (@nicksdjohnson) 's Twitter Profile Photo

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:
Dennis Kniep (@dennis_kniep) 's Twitter Profile Photo

Wrote about a novel technique that leverages the well-known Device Code #phishing approach. It dynamically initiates the flow as soon as the victim opens the phishing link and instantly redirects them to the authentication page. Capable to bypass #fido denniskniep.github.io/posts/09-devic…