Advertisement ยท 728 ร— 90

Posts by Dennis Keefe

Great video Benn! I am personally frustrated by the lack of oversight of the agencies and officers entering plate numbers. I actually just submitted a public records request to a local agency regarding an issue with FLOCK use.

5 months ago 1 0 0 0

DNS Dumpster is a free OSINT tool for passive DNS reconnaissance, widely used in cybersecurity for network footprinting and attack surface mapping.

dnsdumpster.com

1 year ago 5 1 0 0
Post image

If you're planning to launch a new website to start the year strong, my wife would be thrilled to work with you! Check out her business at [Close to the Coast Creative](closetothecoastcreative.com/).

1 year ago 1 0 0 0
Post image
1 year ago 2 0 0 0
Post image

Wishing you all a very Merry Christmas!

1 year ago 2 0 0 0
Post image

Demystifying ๐—ฆ๐—ถ๐˜… ๐—ฆ๐—ถ๐—ด๐—บ๐—ฎ in Cybersecurity: Precision in Threat Reduction

Six Sigma isn't just a manufacturing methodologyโ€”it's a powerful approach to minimizing security vulnerabilities and operational risks. Here's how cybersecurity professionals leverage this strategic framework:

Key Principles:
โ€ข

1 year ago 1 0 0 0

Looks good Gerry!

1 year ago 1 0 0 0
Post image

Snowflake Systems: A Cybersecurity Minefield

In the world of enterprise IT, "Snowflake Systems" represent a unique cybersecurity challenge. These are highly customized, one-of-a-kind IT infrastructures that evolve organically within organizations.

Key Risks:
โ€ข Extreme customization makes consisten

1 year ago 1 0 0 0
Post image

Understanding ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ-๐—ข๐—ฟ๐—ถ๐—ฒ๐—ป๐˜๐—ฒ๐—ฑ ๐—”๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ (SOA) in cybersecurity:

- SOA is a design approach where services (self-contained units of functionality) are provided to other components via a network.

- These services are loosely coupled, meaning they function independently and can be reused across d

1 year ago 0 0 0 0
Advertisement
Post image

An ๐—ผ๐—ป-๐—ฝ๐—ฎ๐˜๐—ต ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ is a type of cybersecurity threat where an attacker intercepts and potentially alters communication between two parties by positioning themselves between the sender and receiver of network traffic. The attacker can eavesdrop on data transmission, steal sensitive information, or man

1 year ago 0 0 0 0
Post image

๐—•๐—ถ๐—ผ๐—บ๐—ฒ๐˜๐—ฟ๐—ถ๐—ฐ ๐—ถ๐—บ๐—ฝ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป involves spoofing or mimicking biometric traits, such as fingerprints, facial features, or voice patterns, to bypass authentication systems. While biometrics enhance security through unique identifiers, practitioners must address vulnerabilities like deepfake technology, repl

1 year ago 2 0 0 0
Post image

A ๐—ง๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—™๐—ผ๐˜‚๐—ป๐—ฑ๐—ฟ๐˜† is a secure, vetted manufacturing facility for producing sensitive hardware components, ensuring the integrity and authenticity of chips and devices used in critical systems. It is a cornerstone of supply chain security, reducing the risk of tampering, counterfeits, and backdoors.

1 year ago 2 0 0 0
Post image

๐—”๐˜๐—ผ๐—บ๐—ถ๐—ฐ ๐—ฒ๐˜…๐—ฒ๐—ฐ๐˜‚๐˜๐—ถ๐—ผ๐—ป refers to the process of ensuring that a series of operations in a system are completed entirely or not at all, preventing partial execution. This is critical in maintaining data consistency and system reliability. Security concerns include vulnerabilities to race conditions, rollba

1 year ago 1 0 0 0
Post image

A 2023 survey found that two-thirds of Gen Z respondents reported being targeted for online โ€œsextortionโ€, with 71% of those who cited catfishing as the โ€œhookโ€ into sextortion saying they were asked primarily to share intimate imagery or personal information.

#cybersecurity #childsafety #awareness

1 year ago 4 2 0 0
Post image

A ๐—ฃ๐—ต๐˜†๐˜€๐—ถ๐—ฐ๐—ฎ๐—น ๐—จ๐—ป๐—ฐ๐—น๐—ผ๐—ป๐—ฎ๐—ฏ๐—น๐—ฒ ๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป (๐—ฃ๐—จ๐—™) is a hardware-based security feature that leverages the inherent physical variations in a device's manufacturing process to generate unique, unclonable identifiers or cryptographic keys. While PUFs enhance security by being resistant to tampering and replication,

1 year ago 2 0 0 0
Post image

๐—ฉ๐—  ๐—ฆ๐—ฝ๐—ฟ๐—ฎ๐˜„๐—น: The Silent Efficiency Killer in Cloud Infrastructure
Virtual Machine (VM) sprawl occurs when an organization creates more virtual machines than it can effectively manage, leading to:

-Increased operational costs
-Reduced system performance
-Unnecessary resource consumption
-Complex infra

1 year ago 1 1 1 0
Advertisement
Post image

๐—™๐—ผ๐—ผ๐˜๐—ฝ๐—ฟ๐—ถ๐—ป๐˜๐—ถ๐—ป๐—ด and ๐—ณ๐—ถ๐—ป๐—ด๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐—ป๐˜๐—ถ๐—ป๐—ด are reconnaissance techniques in cybersecurity, but they differ in scope and purpose. Footprinting involves gathering general information about a target system, organization, or network. This can include details like IP ranges, domain names, and public-facing assets,

1 year ago 1 0 1 0
Post image

I hope that you and your family have an opportunity to make some great memories today. Step away from your keyboards and spend time with those who matter most. Happy Thanksgiving!

1 year ago 1 0 0 0
Post image

๐—ก๐—ฒ๐˜€๐˜€๐˜‚๐˜€ ๐—˜๐˜€๐˜€๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ offers cybersecurity enthusiasts and IT professionals an accessible entry point into vulnerability scanning. This free version of the Nessus Vulnerability Scanner enables users to quickly set up network scans, providing invaluable hands-on experience in identifying potential securi

1 year ago 4 1 0 0
Post image

๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐—ด๐—ฟ๐—ฎ๐—ฝ๐—ต๐—ถ๐—ฐ ๐—˜๐—ฟ๐—ฎ๐˜€๐—ฒ (CE) is a data sanitization method that removes data by deleting the encryption key that was used to encrypt the data, rendering the encrypted data unrecoverable. Key security concerns include proper key destruction, verification of the original encryption implementation, and ens

1 year ago 0 0 0 0
Post image

A zero-fill erase is a data sanitization technique that systematically overwrites all storage sectors of a digital device with binary zeros (0s), attempting to eliminate previously stored information by replacing existing data with a uniform zero state. While simple to execute, this method is consid

1 year ago 0 0 1 0
Post image

Have you filed your Beneficial Ownership Information (BOI)? Be cautiousโ€”some individuals are sending out notices and charging fees of $500 or more to file on your behalf. While the BOI filing requirement is legitimate, these fees are not mandated by the Federal Government. Consider sharing this info

1 year ago 0 0 0 0
Post image

๐—ฅ๐—ฒ๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ฃ๐—ผ๐—ถ๐—ป๐˜ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ (๐—ฅ๐—ฃ๐—ข) is the maximum acceptable duration of data loss during a system failure or disaster, representing the point in time to which data must be recovered after an incident.

#cybersecurity #cyber #CySA #teamSC

1 year ago 0 0 0 0
Advertisement
Post image

The Mayflower Compact - as it is known today - was signed by those 41 โ€œtrueโ€ Pilgrims on 11 November, 1620, and became the first governing document of Plymouth Colony. Of the 41 men who signed, three were related to me.

John Howland (9th great-grandfather)
John Tilley (10th great-grandfather)
Edwar

1 year ago 1 0 2 0
Post image

๐—ฅ๐—ฒ๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ง๐—ถ๐—บ๐—ฒ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ (๐—ฅ๐—ง๐—ข): The maximum acceptable amount of time a system, application, or process can be down after a disruption before normal operations must be restored to avoid significant impact.

#cybersecurity #CySA #levelup #teamSC

1 year ago 2 0 0 0
Post image

๐—ฃ๐—ผ๐—ฟ๐˜ ๐Ÿญ๐Ÿญ๐Ÿฌ is used by the ๐—ฃ๐—ผ๐˜€๐˜ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ผ๐—ฐ๐—ผ๐—น ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ป ๐Ÿฏ (๐—ฃ๐—ข๐—ฃ๐Ÿฏ) to retrieve emails from a mail server. Security concerns include unencrypted communication, making it vulnerable to interception; susceptibility to man-in-the-middle attacks; brute force attacks due to weak passwords; and the lack of mode

1 year ago 2 0 0 0
Post image

๐—ฃ๐—ผ๐—ฟ๐˜ ๐Ÿฑ๐Ÿฏ is used by ๐——๐—ก๐—ฆ (๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—ก๐—ฎ๐—บ๐—ฒ ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ) for resolving domain names into IP addresses.

- ๐—จ๐——๐—ฃ: Handles regular DNS queries for speed.
- ๐—ง๐—–๐—ฃ: Used for large data transfers, like DNS zone transfers.

๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ถ๐˜€๐—ธ๐˜€:
- Spoofing/Poisoning: Redirecting traffic to malicious sites.
- Amplifica

1 year ago 1 0 0 0
Preview
Scottish man linked to hacking group 'Scattered Spider' among five charged in US Tyler Robert Buchanan, 22, has been charged with wire fraud offences in Los Angeles in connection with a series of sophisticated phishing attacks alleged to have been carried out by a cybercrime group...

Five people have been arrested in the US and are alleged to be members of the Scattered Spider criminal gang. This gang is suspected of being behind the MGM attack.

#cybercrime #cybersecurity

news.sky.com/story/scotti...

1 year ago 21 5 1 0
Post image

Looking for Incident Response Playbooks? Check out this website to get some free templates as a starting point.

---> www.incidentresponse.com/

#cybersecurity #teamSC #levelup

1 year ago 4 2 0 0