A Simple Query to hunt for CVE-2023-38831 WinRA... | 2023-08-31
The great thing about threat queries are: they don’t have to be overly complicated. Start out simple, and expand the query to include, exclude, or generate the desired output.
I wrote a very simpl...
Continue Reading...
Continue Reading...
Threat Hunting Tool Highlight - IOC-Fanger | 2023-08-27
One of my favorite CommandLine tools is IOC-Fanger. I work with potentially malicious links and IP addresses, often obtain Indicators of Compromise (IOCs) or have to generate a report for others ...
Continue Reading...
Continue Reading...
Anti-forensics YARA rules | 2023-08-12
Recently, Xavier Mertens, of the SANS Internet Storm Center Mertens, posted about a python script he found which uses the Windows API with a call to GetWindowText(). With my education in digital ...
Continue Reading...
Continue Reading...
Quishing Investigations | 2023-07-31
Quishing, or phishing involving QR codes has been on the rise. My opinion is: adversaries will take advantage of just about anything they can. Since COVID, a lot more people know what a QR code i...
Continue Reading...
Continue Reading...
What makes a good Threat Hunter? My answer may ... | 2023-07-24
I attended an industry conference not too long ago, and took special interest in a breakout session on threat hunting, especially since I just moved into a position at my company on the threat hunt...
Continue Reading...
Continue Reading...
Companies Beware of Proprietary Data Uploaded t... | 2023-03-23
Virus Total is an amazing tool, used by cybersecurity professionals across the world, and across the many industries in the government and private sectors. But beware, just like the saying anything...
Continue Reading...
Continue Reading...
How are you Securing a Remote Workforce? | 2023-03-06
How secure is your remote work force? If the remote COVID pandemic has taught us anything, it should be about securing a remote work force. In the early days, businesses literally had a one-day tur...
Continue Reading...
Continue Reading...
Selecting Security Tools Part 1 - Email Securit... | 2023-03-04
This will be a three-part blog post about cybersecurity tools, and the factors you should consider when selecting tools to implement on your network.
Email use is a fact of life. Just about every ...
Continue Reading...
Continue Reading...
What Soft Skills do I need for Cybersecurity? | 2023-02-28
No matter how technical you are, or non-technical, there are several soft skills everyone in cybersecurity needs to at least have the basics in.
Communication
Without a doubt if you are not able to...
Continue Reading...
Continue Reading...
Should I get cybersecurity certification? | 2023-02-08
Ask any who works in cybersecurity if you should pursue a certification, and you will get mixed results. The two main camps out there either say a certification is required for just about any posit...
Continue Reading...
Continue Reading...
The KeyPass 2 vulnerability argument is getting... | 2023-02-05
Passwords, and the various solutions users take advantage of to secure them, have been increasingly targeted. A vulnerability for KeepPass 2, a popular free and open-source password vault, was rece...
Continue Reading...
Continue Reading...
Russia Cut Off Access to TOR | 2023-02-03
In early December, Russia cut off access to TOR services and servers according to several reports from media including Reuters and Forbs.
TOR, also known as the Onion Router Project, is an anonymi...
Continue Reading...
Continue Reading...
Is there ever enough security? | 2023-02-01
Is there a such thing as an “acceptable level of security?” Ask anyone in field of cybersecurity, and you might get an even split for a yes or no answers. The classic cybersecurity engineering pers...
Continue Reading...
Continue Reading...
Dealing with Spam Calls, Texts | 2023-01-31
Unless you’ve been hiding under a rock the last few years, you should have experienced the spammer/scammer text and phone call phenomenon. It mostly started with the “we’ve been trying to reach you...
Continue Reading...
Continue Reading...
GoogleFi Limited Date Breach | 2023-01-31
Updated @ 21:26 EST
GoogleFi sent out an email on 30 Jan 2023, informing its users of suspicious activity on the network of a “primary network provider.”
The system in question, a 3rd party used ...
Continue Reading...
Continue Reading...
iPhone Privacy Audit | 2023-01-30
This post covers iPhone, however, the features I discuss may be available on popular platforms such as Android.
The integrations available on our mobile devices have, no doubt, enhanced our lives....
Continue Reading...
Continue Reading...