-
TechExams Exclusive: Try Infosec Skills free for 30 days!
Hey there! I just wanted to pass along an offer that you might be interested in! Infosec Skills is currently offering a free 30-day subscription that includes access to all of our content, including over 70 learning paths and seven cloud-hosted cyber ranges. More info » Get your fix of hands-on pentesting, Linux, and…
-
Rising Cybersecurity Threats in 2025: How Businesses Can Stay Protected
Cybersecurity threats in 2025 are getting more advanced than ever—ransomware, phishing, and insider risks are becoming daily challenges for businesses of all sizes. I’ve noticed that many companies still struggle with making security simple and effective. Too often, tools are overly complex and end up unused. From my…
-
How do you secure IoT devices that manage cashless payments and telemetry?
I’m exploring how IoT devices that handle cashless payments, telemetry and remote actions are secured against misuse. In the vending industry, for example, vendekin uses a backend called vNetra that manages live data, machine health, user actions and refunds. I’m curious about the general security practices people follow…
-
Need help with Becrypt and windows xp
I need help with a Windows XP laptop encrypted using Becrypt Disk Protect v6.1.x or v6.2.x. I have the Becrypt passphrase, but cannot access the Windows account. Admin access is disabled, and I need a professional to assist with bypass, recovery, or data extraction.
-
CISA Consolidates Cybersecurity Learning Platforms
From https://niccs.cisa.gov/education-training/cisa-learning: "We are excited to announce CISA’s new Learning Management System has replaced the Federal Virtual Training Environment (FedVTE) and will replace multiple other platforms. CISA Learning will be the go-to learning platform CISA staff, contractors and external…
-
Building A Cybersecurity Program From Scratch - Thoughts?
Salutations to all the CISOs, Cyber Managers, and Directors out there. If you have the time could you go through these steps in setting up a cybersecurity program from the scratch and offer your thoughts? A dozen thanks in advance for the suggestions and tips. You can also use the link at the very bottom if…
-
Server Owner, Business Owner, Application Owner (Whats Doc Called Again?)
Hi guys, For those of you in management, have worked in projects, or carry a name in the form of "Senior NameOfYourRoleHere" you've probably come across that spreadsheet in your department that nicely lists all the servers and applications used by IT (sometimes the entire organization) and it has a column for Server Owner,…
-
Captive Portal Project Using IPv6
An Innovative IPv6 Captive Portal Solution with Integrated DNS and Proxy Services, The IPv6Spot project is an open-source. Project link in my profile information
-
Reschedule exam
I had my Certified in Cybersecurity (CC) exam scheduled for August 14th but rescheduled it to mid-November. I didn't receive a confirmation email. Two days before the exam, I received a reminder email and was surprised. I canceled the exam immediately , and this time received a cancellation email. Now, when I try to…
-
access one computer from another
My FIOS router comes in on the second floor and broadcasts a wireless network called BigWhale. From that router I have an ethernet cable hard wired to another wireless router on the 1st floor called LittleFish. Is it possible for me to access a computer on the LittleFish network from a computer on the BigWhale network? If…
-
Seeking help for packet loss, network latency on lan
Hi,For days now I am trying to find the cause for packet loss on my own lan to any other IP on the lan, also the router/gateway IP. I am running debian 12 os on a poweredge r420 server. I run mtr 192.168.178.1 and ghet a 15% packet loss which can also be noticed in the games which are served by the server to the internet.…
-
IoMT Security Blueprint
Hi All Looking for an IoMT Security Blueprint for the health sector, does anyone have one available? A generic one will be suitable, I have see some extracts from Armis and Nozomi and I know Palo Alto have their own too. Engagement involves both IoMT devices but also Blockchain and AI too. Regards
-
Could Someone Give me Guidance for Implementing a Security Awareness Program?
Hello there, I am working on implementing a security awareness program within my organization and would greatly appreciate your expertise and insights. Our goal is to enhance our overall security posture by improving; employee awareness and response to potential security threats. We have around 200 employees across various…
-
Networking fundamentals, hands-on labs for Tier 1 staff?
I have recently taken over a management position in charge of Tier 1 and Tier 2 technical support teams. I have a number of Tier 1 staff who are hungry for advancement but really need to strengthen their networking fundamentals. Something like CompTIA's Net+ exam would be an appropriate goal. However, while I am a classic…
-
Networking VLANs
The network I manage now has VLANs on multiple switches, This allows me to isolate specific ports to specific functions. For example VLAN 5 is only for wireless access points, so every Switch I want to have an Access point on must have VLAN 5 defined on it and added to the interface. This also allows me to set up a test…
-
What is better, VMware Fusion or Parallels?
Which is better in terms of feature set and customization?
-
Can i ask technical questions?
I see this forum is mostly focused on certifications but there is also non-certificate categories, doubt if it would be odd if i did, i am confused...
-
New algorithm for security
Good morning, everyone. I would like to ask the forum what they think about this new method for data security. A New Algorithm for Zero-Time Factoring of Semiprimes Introduction Context: Semiprimes, which are the product of two
prime numbers, are still an important building block in cryptography
as their factorization…
-
Cost breakdown to build a Security Operation Center
Guys, those who are managing SOC/NOC and or have had experience
building a SOC/NOC from cradle to grave could please let me know how much was your
initial cost for setting up the SOC. I
would appreciate if anyone could provide me with a details cost break down of
the SOC or could provide me with a sample response to any…
-
What do you use Python for?
Personally. What type of use cases do you use? I am currently using it for Excel and file manipulation along with some calculations. NumPY is a really cool library allowing you to vector your array's to speed up processing time. My next journey is API connectivity and sourcing data using those tools. Anyway enough of me,…
-
Seems to be a daily occurrence
As I peruse cyber news on a daily basis...How many times have you come across something that has affected you (Online Service, Store, Bank, Social Media) by a data breach? I can almost name a handful maybe more. Have you ever done anything about it? OR do you just wait till they mail you something stating they F'd up? Have…
-
I created a Cyber Security GRC training course!!
So excited to finally released this! Been working hard on this for the last few months!! you can find it here: https://grcmastery.com Here's a breakdown: https://youtu.be/C6IgksBpMF4?si=Ve1Ul32NwRMVOz-G
-
Web Content Filter Catching Non-Browser Traffic
Hello, My firewall's Web Content Filter is catching traffic that appears to be generated by simply opening emails (NOT clicking any links). It does not coincide with any browser activity. I didn't know this was even possible. Is there a way to pinpoint which emails are doing this? I'm a novice working toward my CompTIA A+,…
-
Blue team certifications?
Does anyone have any experience with https://securityblue.team/ ? I've been asked about Blue Team level 1 certifications and heard people speak highly of them, I just want to know if anyone here done them? I love the syllabus and the fact that they're lab based, seem to be a cheaper alternative to SANS
-
Do you subscribe to any newsletters? If yes, how useful are they?
I've been exploring the world of newsletter, and wondering if there is any good Tech or cyber security newsletter that you personally subscribe to!
-
Cyber Protection Services
What are the main factors that I need to look for before hiring a cyber security service agency
-
Remote Application Installation
I am having an issue on my Windows Server 2019 Terminal Server. Im trying to install quotewerks. Im using an installation file that is on another server that I've shared the database for. It appears to install correctly. However when I start the application, Quotewerks immediately goes non-responsive. I spoke to QW support…
-
How do I fix my folder?
I read an article on how to give a shared drive over the network a recycling bin in a roundabout way...I read if I go into the location tab of one of my shell user folders (i.e. contacts) and change the path to the folder on the network drive that i was looking to add a recyling bin to, that it would allow me to delete…
-
Ways to protect digital assets
Hello, I am currently working on how to protect digital assets and would like to know which one is good and safe for protecting my digital assets. I was surfing on Google yesterday, and according to this reference, this was legal. Is there anyone who knows what article I should read to protect my digital assets?
-
Creating an online training course
Just wondering if anyone here created an online training course or thought about creating one what platforms did you use? what was your workflow like from scripting to recording to editing, etc? Keen to hear experience because I'm thinking of creating some courses :)
-
New Google Cloud Security Certifications
It looks like Google is releasing a new certification in the cloud security space! Do we have any folks working in cloud administration who are thinking of earning this cert? I'd be interested to see how it compares to the AWS security certification.
-
Minimum Threshold for Malicious Flags on VirusTotal
Hi all, What is the minimum number of IPs flagged as malicious on VirusTotal that your team has before a particular IOC is considered MALICIOUS. Can you share your reason? Wanted shared insights because from working at different companies I have seen anywhere from 2 to 30 malicious flags before teams determine an IP (or…
-
Why network layering is important for protocol and standard formation?
Hi all, I am trying to understand the advantage of layering in networking, more precisely, why network layering is important for protocol and standard formation. Would you please share your understanding? Thanks.
-
2023 Verizon DBIR
The 2023 Verizon Data Breach Investigation report is hot off the (virtual) presses! 2023 DBIR Full (PDF) 2023 DBIR Executive Summary (PDF)2023 DBIR Key Insights (PDF)
-
Does anyone use Microsoft Cloud App Security (MCAS)?
My organization is interested in exploring the built-in DLP features of MCAS, but it is new to us. I am curious to hear of other's experience with this solution. The product may not be as mature as the Symantec solution, but we are trying to go cloud native whenever possible.
-
cyber security certification/training suggestions for beginners?
I figured some of my information is outdated as there are numerous new providers. I'm trying to compile a list of cert suggestions for beginners in various specialisation and could use your help! 1) Pentesting Cyber Mentor certifications / trainingeLearnSecurity eJPT SANS GPEN (although not something I'd recommend, the…
-
WeChat.exe Showing Up As Malware? Thoughts?
Hi all, So their's a WeChat.exe that shows up as Malware on VirusTotal (see below). WeChat is a popular social media app used legitimately in China. For you experienced folks what do you all typically do in your corporate environments? Link To VirusTotal WeChat Hash Analysis
-
WAF problem
I have problem on my my WAF , ihave two interfaces connected to waf inside and outside , suddenly the web page of my company stoped when i try to entire to it , when i refresh the page the page work , but after seconds the page also stoped , i try to ping to the server of web the ping stoped when the page stoped , i…
-
IP Address Locations
Hi, I'm not an IT professional, clearly. I'm a police officer looking for tips for a fraud investigation I'm conducting. The suspect sent the victim emails, only minutes apart, and the IP address locations for these emails are hundreds of miles apart. Can someone shed light as to how this would happen? Is it IP spoofing?…
-
How Is AWS Cloud Security Used In Production???
Hello Cloud Experts? How is AWS Cloud Security used in production? At the enterprise workplace so do you configure, administer, and use it directly through amazon.com/aws, or is there a cloud security tool/app that sits between the user and AWS?
-
Thoughts on Tines - codeless SOAR tool
Hi guys, Have any of you all used Tines? a web-based SOAR app? What are your thoughts and comments on how it compares to other competing tools?
-
Typical Day-to-Day Role of 1st Line Managers and Directors (in Corporate environment)
heh guys, So I've been inching towards cyber management lately. Question for those of you who have gone from the Analyst levels into the management ranks: 1.) What is the nature of the first line team manager compared to analysts? Is it more difficult, etc, or the same level? 2.) For those that have become a Director, how…
-
Who Has Installed CrowdStrike? Question on "Medium" Severity Detections
Has anybody here installed or used CrowdStrike - the popular EDR tool? It was recently deployed in our environment but I don't think it's working correctly. On the "Detections" dashboard the True Positive/False Positive ratio on what we're seeing on Medium severity is 2/8. So typically, are Medium severity detections set…
-
Who Has Installed and Used CrowdStrike Falcon?
Has anybody here installed or used Crowdstrike - the popular EDR tool? It was recently deployed in our environment but I don't think it's working correctly. On the "Detections" dashboard here's the True Positive/False Positive ratio on what we're seeing on Medium severity is 2/8. So typically, are Medium severity…
-
materials for SANS's MGT514: Security Strategic Planning, Policy, and Leadership
Wanted to take SANS mgt514 (GSTRT certificate). it's so expensive that my
company refused me to. Do you know of any other source of info to get similar
knowledge at lower price? I prefer paper back book ...but anything would be of
help. My second choice would be an MGT551: Building and Leading Security
Operations Centers.…
-
SPLUNK ES vs SPLUNK
Hi guys, What is the fundamental difference between SPLUNK ES and regular SPLUNK. Is there anyway to use the regular SPLUNK to search and analyze your security environment?
-
Standardized Process For Building SOAR Automations
Hi All, Just curious whether any of y'all have ran across any standardized process that can be used in building out workflows for Security Orchestration, Automation, and Response solutions (SOAR) when provided with a given scenario. Better of a response if the process can be applied to all SOAR solutions regardless of…
-
ChatGPT for InfoSec
There are a lot of InfoSec training programs that are developing exercises based on ChatGPT has either a useful tool or as a malicious foe. I decided to ask ChatGPT what it thinks of itself in these contexts: So ChatGPF can return output that can be useful in increasing the C-I-A of Information. I think this is a detailed…
-
Security+ & Cybersecurity Certified from (ISC)2 before CCSK & CCSP Certification - Your Views
Hello, My Question: Do you think I should start my journey in Cloud Security & Cyber Security through the
Security+ from Comptia and Cyber Security Certified from (ISC)2 certifications
to strengthen my Information Security fundamentals before I move towards Cloud
Security, & Cyber Security? My Background: I have no…
-
Best Solution For Controlling New Application Install In Custom Software Environments
Hi all, For those of you who have experience successfully implementing controls for adding new software in custom environments where the distribution of software use is a combination of custom software, off-the-shelf software, and unsigned (but legitimate) applications. The environment I'm in is as follows: - Total count…
-
How to copy a folder into multiple folders at once
Just as the title asks. I'm looking to copy a whole folder (not just the contents) into a massive amount of folders and I was under the impression there was some sort of batch command I could run to do this for me. However I was having issues, the only option I saw was to specify a file inside of a folder which wouldn't…
-
Unknown device showing up on my offline devices of router, connected via Ethernet
This is driving me nuts. Was messing around with settings today on my router and found this unknown device in "Offline Devices" and that it connected via Ethernet and have no clue what it is. Did a MAC look up and it's an Apple device. What could even be an explanation?? Someone broke into my apartment and connected to the…
-
Can't remove "Program" Item in startup.
Hello, Quick question, I have this issue with a blank program icon "Program" with the command line "C:\Program" Files\Teams Installer\Teams.exe --checkInstall --source=PROPLUS" that I have not been able to remove from the task manager startup screen and I'm not sure what to try next. Notice how it has an extra quotation…
-
Four major Australian businesses got hacked
Not sure if the US audience are aware, but the last 30 days have seen 4 x major breaches in Australia happen, comically one after the other. First is Optus, the second largest telco, what happened wasn't even hack, more like data scrapping from an API. Feds got involved, even the American FBI were involved as it…
-
How much data of a user get recorded by service providers?
If someone from India has optical fiber connection internet for windows10 PC and mobile phone 4g network provider’s internet for android cell phone using 4g sim card, now sometimes he uses PC’s OFC internet in mobile and mobile’s 4g internet in PC using wifi hotspot and both PC and mobile phone’s internet/network service…
-
Telecoms must ensure a comprehensive 5G security
There are an estimated 35k or more carriers with some legit license and probably 20k+ without. Globally there are both private and government-run telecom companies. First, we have to understand which part of 5G is referring to There are three pieces to the internet - sever, network, and clients I think most of them are…
-
In India law allows how much on phone tracking by network providers and Police?
For android phones in India- 1). Does law allow police to get a phone's imei number just by using that phone's number? 2). also suppose if a phone was moving around within few miles radious for few days and it was turned on several times in that duration. But now the phone is turned off permanently and only after phone is…
-
Chrome.exe Alerts
Hi all, Do any of you all receive these notorious Chrome.exe alerts on your EDRs or IDRs? What are these alerts? Are they automatica updates coming from Chrome extensions, or micro version updates from the browser itself? Im stumpted. They're typically something like below: Filename: Chrome.exe FilePath:…
-
IPv6 Adoption over the years?
This discussion post that I encountered from my school was asking about why is the worldwide implementation of IPv6 slow? After researching on this, many articulate that it is quite expensive and also has compatibility issues, at layer 3 IPv4 which is a 32 bit and comes with common classes A, B, C, and D producing up to 4…
-
Community Support For CrowdStrike
Does anybody know if CrowdStrike has a User Community Support portal - the environment where all users of the product globally help each other answer technical-related questions about the product?
-
Typical EDR Reports Created For Management
Hi all, What are some typical EDR reports you normally send to Management on a weekly basis so they're satisfied? A plus if you're using CrowdStrike Falcon
-
Migrating From CylancePROTECT to an EDR solution (e.g. Crowdstrike or Carbon Black)
Hi all, Does anybody have a resource or any insights on migrating from CylancePROTECT (an EPP) to an EDR solution (like Crowdstrike or Carbon Black)? Specifically I'm looking for proof or how to show that the functionality of the EPP solution can be completely replaced by the EDR solution.
-
What is Data Analytics in Marketing?
As defined In digital marketing, big data analytics means examining big data to find the best ways to use the information. This process is quite complicated and requires expertise. But when the result of big data analytics comes out, the stress is always worth it. It involves the study of market trends, the behavior of…
-
how to scan for vulnerabilities in devices which only has serial ports, no ethernet ports.
Hello. May anyone knows how to scan for vulnerabilities in a device which only has serial ports, no ethernet ports. it does not has IP feature.is there any tool available ? Thank you in anticipation
-
NEED HELP Soon to be 50, new and only son. Have worked in IT over 20 years and I use to frequent
This site often often while i was studying for my A+ and Net+ . It feels good to be back among friends with common goals and love for IT. TO get down to brass tax. i at one one was on a successful track, good job,. acquired my 2 certs and I was passionate . This was 2006. I am embarrassed and ashamed to say this guys but i…
-
2022 Verizon Data Breach Investigations Report (DBIR)
Better later-er than never, it's the Verizon 2022 DBIR. (Direct link to 108-page PDF.) 20-page DBIR Executive Summary.
-
Policy Compliance and Guidelines within the UK Public Transportation Sector
Attempting to conduct research into the UK Public Transportation Sector. This would be in regards to future proofing data privacy guidelines as new technology is introduce and implement. Current research shows that there are attempts at introducing technology such as 5G hotspots and further automate services to allow for…
-
SOC Analyst L2 interviews questions and possible answers
Good day, May you kindly assist with SOC Analyst L2 interviews questions and possible answers
-
Cybersec **** Sheets
Here's a page that's basically a link farm of Websites that have tips and tricks useful to Blue team, pentesting, general IT security, and other cyber-related fields.
-
Weblink https://xyz.com/customers.html hosted externally not opens only from internal company domain
Hello, Weblink https://xyz.com/customers.html hosted publicly not opens only from internal company domain abc.com Checked that the site is whitelisted in proxy server by the team Network team confirmed that the ip address of the server hosting the webpage is reachable from the internal network Our internal DNS is AD…
-
From "Senior Analyst" To "Manager"
Hi all, Question to those of you that recently went to management within the past 5 years - What's the best step-by-step way to merge from the Senior Analyst position to Manager? I ask as I have completed management-related projects in my current position of Senior Analyst, yet when I apply to Manager (Level 1) position…
-
Cyber Acronyms Newbies Should Know
When I started my Infosec journey one of the first things I quickly realised is that there are tons and tons of acronyms, and you just have to know them as you move along. I had a glossary of such acronyms when I was learning and I found them recently. This is a list of some basic ones every beginner should know. I'd keep…
-
Review of SOC Core Skills training by Antisyphon InfoSec
Last week I attended the SOC Core Skills training presented by Antisyphon InfoSec Training and Black Hills Information Security (BHIS). This is a 16-hour (4-days, 4-hour sessions) live, virtual, information security training course covering the core security skills all Security Operation Center (SOC) analysts need to have…
-
Best Source of Templates for Processes/Playbooks/Policies
Hello Cyber Clan, In your opinion what has been the best place online to get templates for security processes/playbooks/policies that you can modify to suite your organizations environment?
-
Tool Library For Security Assessments
Hi all, Is there somewhere where you can get a "library of tools organized according to the solution they provide for each "requirement" outlined in the NIST CSF framework? For instance, for the controls identified below namely ID.AM-1, there would be a list of commonly available software such as LanSweeper, etc, and a…
-
Need Help
I was using someones hotspot and now my phone is changing its password on its own even though my phone is not connected to the internet. Can anyone please give me a solution and a way to prevent this from happening in future?
-
what happened to...
Anyone know what happened to this site? https://www.ethicalhacker.net/ Retired? New Career?
-
What Threat Intelligence Platform/TIP do you use & Why?
This post is really a way for me to better gauge where, who, and why any organization is using such a thing like TIP. As with most things in the industry, things can become buzz words and only provide superficial value that isn't very valuable (in the state its delivered) at later glance. For the past decade, I feel like…
-
Getting into a Gameserver
Hey guys, I just started out with pentesting etc. just because I'm interested in it. A good friend of main allowed me to use his minecraft server for pratice and to see if I could gain any acces at all. I have scanned a lot of ports, even found his ssh username trough username enumeration but I'm stuck now. what else can I…
-
Instant messaging security analysis
Hello Everyone,Recently, I was interested in the issue described in the topic and how it would be possible to perform sample tests and what tools could be used in such a case. What I mean here is to show how End to End (E2EE) encryption works and other examples of this type. I read the white papers of messengers like…
-
ISO 27001 compliance question
Hi I would like someone to clarify whether the implementation guidance in 27002 is mandatory? Specifically, looking at password management systems, 27002 states that the system should “force users to change their passwords at first log on” whereas the 27001 standard itself does not. if I am conducting an audit and forcing…
-
Audit AD computers
Hi, I'd like to audit an AD environment and want to include domain users computers. is there tool i can use to have audit information on the computers like user accounts infos, os versions...without having to go on computers one by one? Thanks for your help.
-
Double firewall security architecture
Hello, i would like to ask a question that i've been thinking about since a while. Within a secure network architecture, it is recommended to have an external and internal firewalls. one key adventage is the it removes the single point of failure. Basically (theorically): External firewall filters trafic between internet…
-
Recommended solutions for cloud datastores discovery?
What would be your go-to solutions to gain full visibility of your entire cloud data assets (managed / self-hosted / computes)?
-
Please, what is the best certifications for cyber security management & Policy ?
Please, what is the best certifications for cyber security management & Policy ?
-
Invoke-WebRequest returning the content as an error message rather than as an HTMLWebResponse
I'm trying to setup some monitoring on a server to alert when a service is not running properly. (I already have monitoring on the services themselves, but I occasionally see a service hang that still says its running when it isn't). I'm able to Invoke-WebRequest to the port I need and use the RawContentLength property to…
-
Do you use a password manager for your personal stuff?
What do you use? is it on your phone or laptop? looking for something for personal use, I'm an iphone/mac user
-
Anyone go through Burp Suite's Web Security Academy?
Over the weekend I started going through the online training for the Burp Suite Practitioner Certification. I was curious if anyone here has gone the courseware or taken the exam and what your thoughts were about it. Web application pen testing is a weak area of mine, which is why I wanted to go through the course and…
-
cyber security jobs have a high turn over, but why?
I noticed that the average tenure in cyber security roles in the US is 6-18 months on average (not an accurate statistic, but observational). It's a bit longer in Australia but it's still considered relatively short as well. I'm trying to understand the reasons behind it, and could come up with a few reasons. One, Salaries…
-
UTMStack for HIPAA compliance
Is it a good practice to use the free SIEM tool named UTMStack to manage HIPAA compliance?
-
Report Recommendations
Hi guys, So can you all suggest some cyber security reports I can create for our upper management? This ask is especially for those of you in cyber management, or those of you who have dealt with the management types regularly? I now happen to be the only cyber security guy in our organization, a company providing…
-
HIPAA Security Tool!! Still Current?
Hi all, Are you all that have worked in healthcare settings familiar with the HIPAA Security Tool? Isn't the one at this link a bit outdated? If you scroll to the bottom of the pate it says Created December 2016 https://csrc.nist.gov/projects/security-content-automation-protocol/hipaa
-
Any known SSH attacks/vulnerabilities other than dictionary attacks and compromising keys ?
Hi everyone, I am looking for attacks over TOR which can be applied to a server running SSH. I have been looking at SSH.com (SSH creator's website), IEEE papers, SpringerLink papers/books, etc. but so far I have only found that the atttacks performed on SSH are dictionaty attacks, brute force attacks and compromising…
-
How to get a job in Cyber security? I made a video.
I found myself with a bit of free time this week (in yet another lockdown ) so I made video. I'm camera shy so be kind! Guess this is my first face reveal here... thought I'd start referring people to this video when they ask me this question as I get asked this question a lot https://youtu.be/dqbs-bYGKqE
-
ISAE 3402
Do we need to conduct penetration test for ISAE Audit ?
-
Configuring Cloud Drives for HIPAA Compliance
Hi guys, Most of us are familiar with cloud drive services like Microsoft OneDrive or Box.com right? The general gist is that to maintain HIPAA compliance with these services you have to configure it within your organization to maintain HIPAA compliance. Do any of you all know what they mean by that? I included the links…
-
Microsoft IOC Detection Tool For Exchange Server Vulnerabilities
Hi all, Have any of you messaging folks ever ran Microsoft IOC Detection Tool for Exchange Server Vulnerabilities? I need some insight on this tool because recently I ran it but the resulting CSV made no sense. I have attached this CSV. Does anybody know what the headings (like Oabgen, Ecp, AutodProxy, EcpProxy, etc) in…
-
GICSP Materials
Any one help if GICSP can be taken as a self study. Any recommended Materials? I have gone through the forum and found the following but not sure if these are sufficient to cover the exam. - Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems…
-
Methodical Journey From Chaotic Network To Secure Network
Hello ladies and gentlemen, For those who have walked this journey or that have the knowledge is there a methodology that exists for small businesses to go from a chaotic/disorganized network to a secure network environment where the cyber security maturity journey can now begin. In recent years I've witnessed…
-
Backlink Indexing issue
Hello everyone, hope you are doing well. Actually, I am facing some issues. I am making backlinks but these are not indexing in the google database. So please tell me how can I solve this problem. Thanks in advance.
-
Cyber Ranges Discussion
Dear All, I'd like to get some discussions going for ICS/SCADA cyber range lab (lightsout). In particular I am interested in hints for getting Flag 5. Via apache logs I got that engineering and management are valid usernames. From sql DB I got the password hashes of these two accounts, but the wordlists on the machine…