Threat breakdown
Malicious QR Codes
Quishing turns a harmless-looking QR code into a phishing hook. Learn how malicious QR code attacks work, real-world examples, the warning signs, and how to defend your business.
// KNOWLEDGE_BASE
Plain-English briefings, checklists and field notes on the social-engineering and endpoint threats facing businesses today — from the Pendergrass Consulting security team.
// CORE_BRIEFINGS
Threat breakdown
Quishing turns a harmless-looking QR code into a phishing hook. Learn how malicious QR code attacks work, real-world examples, the warning signs, and how to defend your business.
Threat breakdown
LOTL attacks abuse trusted built-in tools like PowerShell, WMI and certutil to stay invisible. Learn how Living-off-the-Land attacks work and how to detect and defend against them.
Threat breakdown
ClickFix attacks trick people into pasting malicious commands using fake CAPTCHA and bogus error prompts. See how the copy-paste attack works and how to defend your team.
Threat breakdown
Attackers install legitimate remote monitoring and management (RMM) tools to quietly control victim machines. Learn how RMM abuse works, the warning signs, and how to defend.
// ARTICLE_FEED
We are building a library of short, practical resources. Here is what is on the way — check back soon, or ask us to notify you when they publish.
A short, ready-to-run briefing managers can deliver in a single staff meeting to cut quishing risk fast.
An annotated walk-through of what a fake-CAPTCHA lure looks like and the exact moment to stop.
A simple approved-tools policy template you can adapt for your business in an afternoon.
Why Living-off-the-Land attacks slip past traditional tools, and what to look for instead.
▮ SECURE.EXE
Pendergrass Consulting turns this knowledge into hands-on security awareness training tailored to your business.