Information gathering

Where do I get my information? Podcasts Risky Business, Patrick Gray, https://podcasts.google.com/?feed=aHR0cHM6Ly9yaXNreS5iaXovcnNzLnhtbA&ep=14 Blueprint, John Hubbard, https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS8xMTQyNzIwLnJzcw&ep=14 Defense In Depth, Allan Alford & David Spark, https://podcasts.google.com/?feed=aHR0cHM6Ly9kZWZlbnNlaW5kZXB0aC5saWJzeW4uY29tL3Jzcw&ep=14 Newsletters Integriti TL/DR sec Daniel Miessler Risky.biz Twitter

Security architecture anti-patterns

Nice write-up from the NCSC in the UK regarding common mistakes in designing IT systems and their administration. https://www.ncsc.gov.uk/whitepaper/security-architecture-anti-patterns Do you use the ‘browse-up’ method for system administration? In other words, do you use a so called ‘jump-box’ to manage your systems? Find out how you can avoid this!

Cunning phishing tactics

As you might know, phishing is the most widespread tactic to deliver malware to clients.This article discusses some new tactics and techniques used by adversaries to deliver their payload onto our computers. Stay safe and think before you click that link or open that document! https://www.pcrisk.com/internet-threat-news/16577-microsoft-reveals-fiendish-phishing-tactics

BHIS – GPO’s that kill Kill Chains

The guys (and girls) from BHIS have put together an excellent list of GPO’s that every company that takes Information security serious, should apply. Have a look here: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/ “What’s a ‘kill chain’ again?”, I hear you asking. I’ve got that covered too 🙂https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html