There is no excerpt because this is a protected post.
Category: INFOSEC
Office 365 organizations may unknowingly be forwarding email to external recipients. This leaves them open to a wide variety of threats and security vulnerabilities. In this blog post, we’ll take…
I have been working on a malware investigation for a few weeks. A compromised system was suspected of participating in an attack on another system on the internet. Having identified…
I have added a few pages to archive documents related to large breaches from 2018. You can find links in the Documents menu above. I am sure I will be…
Author’s Note: This article was inspired by a blog posting over at the SANS Storm Center Infosec Forums. The article, Tracking Newly Registered Domains by Xavier Mertens details ways to…
This is going to be a quick post about using Splunk to look for anomalous activity in your O365 instance. I occasionally have the need to look for abnormal logins…
Some friends that turn to me for information security advise recently asked my thoughts on the recent announcement of the data dump announced earlier this morning. I have not updated…
A client consulted me about going to a paperless environment. His company utilizes several different forms and numerous other documents through the course of daily business. These documents were typically…
I am just starting to learn the power of bash scripting. So, this script below may not be the best way of doing this, but hear me out. I often find…
The other day I was trying to log in with a newly created user in CentOS Linux with the The United States Government Configuration Baseline (USGCB) security settings applied. The…