That InfoSec Guy

InfoSec ramblings and other loosely related topics

Menu
Skip to content
  • Home
  • About Me
  • Documents
    • Data Breach Reports
      • Equifax
      • Marriott
  • PGP Public Key
  • Projects
    • Malware Hash Tables
    • Project Black Water
  • Random Quotes
    • Hidden Quotes
  • Resources
    • Forensic Tools
    • Security Awareness Training
    • Videos
    • Tools
  • Scams

Category: INFOSEC

  • INFOSEC

Protected: The Never-Ending Deluge of Vendor Emails: A CIO’s Nightmare

  • Posted on 2024-09-042024-09-04
  • by George Silowash

There is no excerpt because this is a protected post.

Read More
  • INFOSEC

Dump Your Users’ Email Forwarding Recipients from Office 365

  • Posted on 2022-08-04
  • by George Silowash

Office 365 organizations may unknowingly be forwarding email to external recipients. This leaves them open to a wide variety of threats and security vulnerabilities. In this blog post, we’ll take…

Read More
Threat Intelligence
  • INFOSEC

Threat Intelligence

  • Posted on 2020-02-19
  • by George Silowash

I have been working on a malware investigation for a few weeks. A compromised system was suspected of participating in an attack on another system on the internet. Having identified…

Read More
Reports & Testimony related to Equifax & Marriott Data Breaches
  • INFOSEC

Reports & Testimony related to Equifax & Marriott Data Breaches

  • Posted on 2019-03-17
  • by George Silowash

I have added a few pages to archive documents related to large breaches from 2018. You can find links in the Documents menu above. I am sure I will be…

Read More
Threat Hunting Using Newly Registered Domain Lists – Part 1
  • INFOSEC

Threat Hunting Using Newly Registered Domain Lists – Part 1

  • Posted on 2019-03-112019-03-11
  • by George Silowash

Author’s Note: This article was inspired by a blog posting over at the SANS Storm Center Infosec Forums. The article, Tracking Newly Registered Domains by Xavier Mertens details ways to…

Read More
Helpful Splunk Search for Office 365
  • INFOSEC

Helpful Splunk Search for Office 365

  • Posted on 2019-02-192019-02-19
  • by George Silowash

This is going to be a quick post about using Splunk to look for anomalous activity in your O365 instance. I occasionally have the need to look for abnormal logins…

Read More
Passwords & Data Breaches
  • INFOSEC

Passwords & Data Breaches

  • Posted on 2019-01-192019-01-19
  • by George Silowash

Some friends that turn to me for information security advise recently asked my thoughts on the recent announcement of the data dump announced earlier this morning. I have not updated…

Read More
  • INFOSEC

Going Paperless: Where Paper Meets Bits and Bytes

  • Posted on 2012-08-292019-01-19
  • by George Silowash

A client consulted me about going to a paperless environment. His company utilizes several different forms and numerous other documents through the course of daily business. These documents were typically…

Read More
Logging User Activities within Linux with bash scripts
  • INFOSEC

Logging User Activities within Linux with bash scripts

  • Posted on 2012-08-232019-01-19
  • by George Silowash

I am just starting to learn the power of bash scripting. So, this script below may not be the best way of doing this, but hear me out. I often find…

Read More
  • INFOSEC

pam_tally2 Authentication issues

  • Posted on 2012-08-232019-01-19
  • by George Silowash

The other day I was trying to log in with a newly created user in CentOS Linux with the The United States Government Configuration Baseline (USGCB) security settings applied. The…

Read More

Posts pagination

Page 1 Page 2 … Page 4 Next Page

Recent Posts

  • Protected: The Never-Ending Deluge of Vendor Emails: A CIO’s Nightmare
  • Dump Your Users’ Email Forwarding Recipients from Office 365
  • Raspberry Pi Backup
  • More Credential Phishing
  • Threat Intelligence

Categories

  • Forensics
  • Ham Radio
  • INFOSEC
  • Life
  • Random
  • Raspberry Pi
  • Scams
  • Tech
  • Threat Intel
  • Water Cooler

Archives

Things I Read

  • Schneier on Security
  • Ars Technica
  • CIO
  • Bellingcat: the home of online investigations
  • IntelTechniques
© Copyright 2025 – That InfoSec Guy
Bezel Theme by SimpleFreeThemes ⋅ Powered by WordPress