PowerShell is an amazing tool for scripting and developing automation. It has helped me save so much time in setting up rules, policies, software, and small details on an enterprise level. I’m going to go through the hunting process when trying to investigate for malware on the network via PowerShell hunt in CrowdStrike. CrowdStrike isContinue reading “Threat Hunting in CrowdStrike”
Tag Archives: Information Security
HOU.SEC.CON 2022
Day 1 at Houston Security Conference The vibrancy surrounding the 2022 Houston Security Conference (aka HOU.SEC.CON) is electric. This event has gotten better and better every year, and I am extremely excited to take part in this again this year. I’ll be writing about some of my experiences, some of the speakers I visited (notContinue reading “HOU.SEC.CON 2022”
Testing Malicious URL links
We all receive emails with URL links in them. It has become increasingly impossible to tell if a URL link is malicious or not. I will introduce some tools and techniques to make sure you understand how to test URL links for yourself. I will be using three different tools, VirusTotal, Any.Run, and URLScan.io. WARNING:Continue reading “Testing Malicious URL links”
Mental Health in Cybersecurity
Mental health is an important part of life in 2022. According to the non-profit Mental Health America, the percentage of adults with a mental illness report unmet need for treatment has increased every year since 2011. This has only escalated with the pandemic. In a career as stressful and stretched as cybersecurity, it can beContinue reading “Mental Health in Cybersecurity”
Russian Invasion of Ukraine
What is happening On Wednesday February 23rd, 2022, Russian troops outside of Ukraine began infiltrating the borders of the Ukraine. Despite all the warnings and threats of sanctions from NATO nations, Russia continued to invade Ukraine territory. Since then, Russian troops have taken control of Chernobyl, and there has been bombings and clashes in Ukraine’sContinue reading “Russian Invasion of Ukraine”
Creating a Consumer Secure Market Place
Do you know how secure your smart TV is? What about your phone? Is Siri constantly listening and recording waiting to hear “Hey Siri”? What is it doing with that information? What about your baby monitor? In 2018 NPR reported a South Carolina mother’s baby monitor had been hacked. She thought it was her husbandContinue reading “Creating a Consumer Secure Market Place”
MosaicLoader Malware
Since before the depiction of Neptune immortalized in a mosaic in the 3rd Millenium, mosaics have been a source of wonder and amazement. The fine details in an artists expression has been part of past and current artistic works. Newer “artists” are creating masterpieces within a more digitized medium known as malware. This malware isContinue reading “MosaicLoader Malware”
PrintNightmare IV – The SYSTEM Master
In 1988 Wes Craven’s “Nightmare on Elm Street 4 – The Dream Master” was released. It was the same year Microsoft released Windows 2.1. I’m betting even Wes Craven couldn’t have imagined a scenario quite like PrintNightmare. Microsoft has tried to fix PrintNightmare 3 different times and they are going on their 4th. I’m goingContinue reading “PrintNightmare IV – The SYSTEM Master”
Kaseya With a Helping of PrintNightmare
I have been deep in to researching (AKA: Twitter-ing) the Kaseya Attack and the PrintNightmare vulnerability. I’m going to keep it somewhat short. First, lets look at the technical perspective and how organizations are dealing with PrintNightmare and Kaseya attack. I will then focus on why it’s important to keep an eye out for theseContinue reading “Kaseya With a Helping of PrintNightmare”
Setting up Security Onion
Setting up security onion can be a pain if you haven’t done it before. If you follow the instructions to the letter, you will be fine, however I am impatient and need to try, and fail, repeatedly so I can memorize how to get it built. First and foremost, you will want to make sureContinue reading “Setting up Security Onion”