CyberAttacks More Sophisticated

The attackers are getting better, they are not sitting still. If you are hoping no one will notice you in your personal world … not likely, everyone is a target. In this post lets connect a few dots: SCmagazine story:“Social Media and Engineering Used to spread tempted cedar spyware” So a fake Facebook profile method … Read more

Test your network by Bloodhound

Which Bloodhound might you ask? No not the Dog… But the following program in Kali Linux: Just a slightly different picture and meaning. Cobaltstrike has tested with it and this is his explanation: “BloodHound is a tool to analyze and understand Active Directory Trust Relationships. For an offensive practitioner, this tool can highlight the hops … Read more

Trust Issues in Security

Who do I trust when dealing in Security? (definition of ‘trust’ from Google) First impressions count – remember what everyone says… But Wall Street Journal story “The Mistakes You Make In a Meeting’s First Milliseconds” has a communications coach saying that you should not always trust your first impressions. And there is a way to … Read more

Risk Management Should Be: Known Threats Evaluated – Find Unknown Threats

It is a known fact that Risk management looks in the known facts department.  As we try to evaluate what issue to focus on. Nowhere is this Security as last point of order more evident than in the Cryptocurrency markets being created with ICO’s (Initial Coin Offerings). You would think that when setting up an … Read more