Category : Security Operations
Intro to Email Security with SPF DKIM and DMARC
by Justin
Phishing and e-mail in general continue to be the most targeted attack vector according to Cloudflare’s 2023 Phishing Report. With e-mail service being the live blood of communication for most organizations, the security of such a service is paramount. Hardening...
Protecting Your Brand from Domain Impersonation Attacks
by Justin
Your website is an extension of your business, and your domain name represents that online presence by providing your visitors with an easy way to connect with your business whenever they want. Domain impersonation attacks have been around for a...
An Introduction To Automating Open Source Intelligence Gathering Using Spiderfoot
by Justin
SpiderFoot is a Open Source Intelligence (OSINT) tool that combines the power of many Internet API’s to gather intelligence on Names, E-mail Addresses, Domains, IP Addresses, and more. This article will help you get setup with a local installation of...
Artificial Intelligence – Limitations, Attack Vectors, and Threat Modeling
by Justin
Every couple of years a new or evolving technology bring about a whole new set of buzzwords that are often misunderstood by the general public. First, we saw the advent of the “cloud”, which is still not very well understood...
Supply Chain Attacks Explained
by Justin
With the recent news of 3CX supply chain attacks I think it’s important to understand what, exactly, a supply chain attack is, and how you and/or your organization can help to reduce the risk and impact of a supply chain...
Easy GitLab Upgrading Using The Upgrade Path Tool
by Justin
What Is GitLab? GitLab is web software built on the popular Git Version Control system that provides organization and control to DevOps activity. Similar to GitHub, it allows you to store and organize code, create CI/CD pipelines, as well as...