How phishers deliver Qakbot malware through OneNote file attachmentsIntroductionFeb 9, 2023Feb 9, 2023
3 Effective Detection Use Cases for Identifying and Mitigating ThreatsIn today’s digital landscape, where the number, speed and sophistication of cyber threats are constantly increasing, security teams must be…Dec 18, 2022Dec 18, 2022
Impersonation Email Scams on the Rise: How to Protect Your BusinessInternal impersonation or funds transfer fraud (FTF), is a type of email scam where the threat actor poses as someone else within the…Dec 14, 2022Dec 14, 2022
Investigating Credential Harvesting HTML Attachments (HTML Smuggling)The 2022 State of the Phish report by Proofpoint found that a significant proportion of working adults surveyed had a false sense of…Dec 8, 2022Dec 8, 2022
Malware Traffic Analysis — Burnincandle WalkthroughThis is a walkthrough for the Malware Traffic Analysis packet capture exercise called BURNINCANDLE. The exercise requires the use of…May 30, 202217May 30, 202217
Analyzing Dridex malware network trafficBrad Duncan, who runs the website Malware-Traffic-Analysis.net, posted a new packet capture, which you can find here. This is a great…Aug 18, 202113Aug 18, 202113
What is a DMZ, and why is it important?A DMZ, or De-Militarized Zone, is a term originally coined by the military. Wikipedia defines a DMZ as:Aug 3, 2021Aug 3, 2021
Hashing & Integrity — The “I” in the CIA TriadIn cybersecurity, there is a concept known as the CIA Triad — Confidentiality, Integrity, Availability:Jul 18, 20211Jul 18, 20211
Imposter syndrome and social mediaOne dictionary defines imposter syndrome as:Jun 16, 20213Jun 16, 20213
Pentesting, note-taking & organizationI generally prioritize organization and structure. One thing that I have made a point to do in my cybersecurity journey is take notes, and…Jun 4, 2021Jun 4, 2021
On variety, humility and the value of sucking at somethingThere is such a vast amount of responsibilities and skills that go into cybersecurity. It is impossible to learn it all. Quite a few…May 15, 2021May 15, 2021
Walkthrough: Infection at the Japanese office (Courtesy of Malware-Traffic-Analysis)This is a walkthrough for the Malware-Traffic-Analysis.net case called Infection at the Japanese office. The link to the page at MTA is…May 6, 2021May 6, 2021
The big business of phishingA report by the FBI found that business email compromise (BEC) scams cost American organizations over $1.8 billion in 2020. The average…Apr 15, 2021Apr 15, 2021
IMINT/GEOINT: Image and Geospatial IntelligenceOSINT — short for Open Source Intelligence, is not just random information in cyberspace: It is publicly and legally available, information…Apr 7, 2021Apr 7, 2021
TryHackMe and the Cyber Defense learning pathEver since I joined the LinkedIn cybersecurity community, I’ve seen numerous references to TryHackMe. Initially, I thought it was strictly…Mar 26, 2021Mar 26, 2021
WireShark for network forensicsIt’s another day, and I am excited investigate another PCAP file on WireShark. To me, the process of finding and documenting the who, what…Mar 9, 20211Mar 9, 20211
Cybersecurity, meet Jazz: What music can teach about collaborationI grew up deeply immersed in music. There is a photo of me sitting at the piano as a toddler. I would later go on to major in jazz…Mar 7, 2021Mar 7, 2021
Thwarting ransomware: Insights from EVIL-Ution webinarRansomware is one of the most popular cyber attacks. According to the CISA (Cyber Infrastructure Security Agency), the estimated annual…Feb 27, 2021Feb 27, 2021
MITRE ATT&CK: Insights into an emerging frameworkI’ve been taking online courses from the AttackIQ Academy on the MITRE ATT&CK framework, and it has been an awesome resource!Feb 19, 2021Feb 19, 2021