Exploring Cyber Soft Target Indicators (CSTIs)

“Soft Target” is a term used to describe a person, place, or thing that is relatively unprotected and vulnerable to attack. Terrorists, criminals, and otherwise unscrupulous individuals often look for “soft target indicators” when selecting a target (potential victim). Doing so helps an attacker assess the level of personal risk and weigh it against the…
Read More

Dissecting Disinformation & Misinformation

Disinformation and Misinformation is rampant today‚Ķor is it? While these TERMS certainly seem to be rampant today many people being exposed to them (or in some cases even using them) aren’t exactly sure what they mean or know how to tell the difference between the two. In this brief video, we’ll take a look at…
Read More

Business Email Compromise Defense

While Ransomware continues to dominate the headlines, Business Email Compromise (BEC/EAC) tops the list of financial losses (over $1.8 billion dollars) in the most recent FBI Internet Crime Complaint (IC3) report. This trend shows no signs of slowing down as BEC attacks continue to grow in number and effectiveness. If you are involved in processing financial transactions…
Read More

Phishing Attacks & Defense

Phishing is one of the most common (and effective) forms of cyber attacks today. In this short video, we’ll examine some simple techniques that can be used (by technical and non-technical individuals) to better defend against phishing attacks. For an in-depth exploration of phishing attacks and how you can defend against them enroll in the…
Read More

Why Do We Even Have That Server?!

Wow! What an end to a good (albeit frustrating) week! In between multiple engagements for several clients this week, I somehow managed to learn that “flowers are like a picnic for butterflies…” Yep, busy week but I still managed to get in all the bedtime stories with the kids! I’ve seen an interesting trend during…
Read More

Seat Belts Save Lives…We Should Stop Using Them

Sounds a bit crazy doesn’t it? Seat belts have been proven to significantly reduce the risk of death or serious injury in the event of a motor vehicle crash, and I’m recommending that we stop using them altogether? Why in the world would someone in their right mind make that kind of recommendation!? It’s simple,…
Read More

Quick Connection Info with ‘netstat’ (Linux)

There are things in this world that will likely always be a mystery to me. For example, why are feminine hygiene products and toothpaste both stored in similar looking tubes? As both of these products are often found in bathrooms around the world it stands to reason that some poor guy (likely living in a…
Read More

Simple ICMP Host Discovery with Nmap

The other day I needed to rapidly scan a range of IP addresses for hosts that responded to ICMP echo requests. I also needed the responding IP addresses to be in a simple list format (with a single IP per line). While there are many ways to do this I needed something quick (only had…
Read More

MIT(R)M Attacks – Your middle or mine?

Recently (actually months ago now) my wife went out to see some friends from Church which left me with a couple of hours to kill at home (after I put the kids bed of course). I decided to use this opportunity to look for security vulnerabilities in the wireless router provided by my ISP. I…
Read More