A Simple Query to hunt for CVE-2023-38831 WinRAR Exploitation | 2023-08-31

A Simple Query to hunt for CVE-2023-38831 WinRAR ExploitationThe great thing about threat queries are: they don’t have to be overly complicated. Start out simple, and expand the query to include, exclude, or generate the desired output. I wrote a very simple query to find exploitation of WinRAR under CVE-2023-38831. This exploitation is rather simple as well, with...

Threat Hunting Tool Highlight - IOC-Fanger | 2023-08-27

Threat Hunting Tool Highlight - IOC-FangerOne of my favorite CommandLine tools is IOC-Fanger. I work with potentially malicious links and IP addresses, often obtain Indicators of Compromise (IOCs) or have to generate a report for others to read, where I do not want users to click on the links, or automated tools to resolve the...

Anti-forensics YARA rules | 2023-08-12

Anti-forensics YARA rulesRecently, Xavier Mertens, of the SANS Internet Storm Center Mertens, posted about a python script he found which uses the Windows API with a call to GetWindowText(). With my education in digital forensics, I find anti-forensics methods interesting. Anti-forensics includes methods designed to prevent, slow down, or impede static of...

Quishing Investigations | 2023-07-31

Quishing InvestigationsQuishing, or phishing involving QR codes has been on the rise. My opinion is: adversaries will take advantage of just about anything they can. Since COVID, a lot more people know what a QR code is and how to use them, just enough knowledge to be dangerous. I would wager...

Companies Beware of Proprietary Data Uploaded to Virus Total | 2023-03-23

ConfidentialVirus Total is an amazing tool, used by cybersecurity professionals across the world, and across the many industries in the government and private sectors. But beware, just like the saying anything posted on the Internet will be there forever. Analyst might routinely upload documents to Virus Total to detect known...

How are you Securing a Remote Workforce? | 2023-03-06

Remote WorkHow secure is your remote work force? If the remote COVID pandemic has taught us anything, it should be about securing a remote work force. In the early days, businesses literally had a one-day turn around from all on-site operations, to just about a 100% remote work force. I worked...

Selecting Security Tools Part 1 - Email Security Solutions | 2023-03-04

EmailThis will be a three-part blog post about cybersecurity tools, and the factors you should consider when selecting tools to implement on your network. Email use is a fact of life. Just about every platform you sign up for an account requires you to submit your email address. Your address...

What Soft Skills do I need for Cybersecurity? | 2023-02-28

Soft SkillsNo matter how technical you are, or non-technical, there are several soft skills everyone in cybersecurity needs to at least have the basics in. Communication Without a doubt if you are not able to communicate, both written and verbally, you will struggle in cybersecurity. Every position I have had in...

Should I get cybersecurity certification? | 2023-02-08

CertifiedAsk any who works in cybersecurity if you should pursue a certification, and you will get mixed results. The two main camps out there either say a certification is required for just about any position in the industry, or a certification is completely useless. Certifications can be either woefully inflated,...

Russia Cut Off Access to TOR | 2023-02-03

The Tour ProjectIn early December, Russia cut off access to TOR services and servers according to several reports from media including Reuters and Forbs. TOR, also known as the Onion Router Project, is an anonymizing network used by malicious actors and those seeking privacy for their personal activities or professional work such...

Is there ever enough security? | 2023-02-01

AcceptableIs there a such thing as an “acceptable level of security?” Ask anyone in field of cybersecurity, and you might get an even split for a yes or no answers. The classic cybersecurity engineering person might say “No! There is never enough security!” While a more strategic person would say...

Dealing with Spam Calls, Texts | 2023-01-31

Spam CallersUnless you’ve been hiding under a rock the last few years, you should have experienced the spammer/scammer text and phone call phenomenon. It mostly started with the “we’ve been trying to reach you about your car’s extended warranty” robo calls, and has morphed into quite the out of control daily...

GoogleFi Limited Date Breach | 2023-01-31

GoogleFiUpdated @ 21:26 EST GoogleFi sent out an email on 30 Jan 2023, informing its users of suspicious activity on the network of a “primary network provider.” The system in question, a 3rd party used for “GoogleFi customer support purposes” contains limited customer data including the following: Phone number When...

iPhone Privacy Audit | 2023-01-30

Application Privacy ReportThis post covers iPhone, however, the features I discuss may be available on popular platforms such as Android. The integrations available on our mobile devices have, no doubt, enhanced our lives. It is nice to reserve a table at your favorite restaurant using a service like Open Table and have...

Back…