Category: Cybersecurity

  • Why Multi-Factor Authentication (2FA/MFA) Usage Numbers Will Not Improve Any Time Soon?

    Why Multi-Factor Authentication (2FA/MFA) Usage Numbers Will Not Improve Any Time Soon?

    If you have missed the news lately, cybersecurity is one of the most discussed topics nowadays. From supply chain exploits to data leaks to business email compromise (BEC) there is no break – especially during the pandemic. Many (if not all) start with an account compromise. And if you ask any cybersecurity expert, they will…

  • Learn More About Your Home Network with Elastic SIEM – Part 2: Collect Firewall Logs

    Learn More About Your Home Network with Elastic SIEM – Part 2: Collect Firewall Logs

    In my previous post, Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM, I explained how you could set up Elastic SIEM on a Raspberry Pi[ad]. The next thing you would want to do is to collect the logs from your firewall and analyze them. Before I jump…

  • Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM

    Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM

    Last night I had some free time to play with my network, and I ran  tcpdump out of curiosity. For a while, I’ve been interested to analyze what traffic is going through my home network, and the result of my test pushed me to get to work. I have a bunch of Raspberry Pi devices…

  • Implementing Cybersecurity Research Sandbox Environment in the Cloud

    Implementing Cybersecurity Research Sandbox Environment in the Cloud

    For a while, I’ve been planning to build a cybersecurity research environment in the cloud that I can use to experiment with and research malicious cyber activities. Well, yesterday I received the following message on my cell phone: Hello mate, your FEDEX package with tracking code GB-6412-GH83 is waiting for you to set delivery preferences:…

  • 3 Simple Ways to Collect Social Engineering Data for Free

    3 Simple Ways to Collect Social Engineering Data for Free

    In my last post, I demonstrated how easy it is to create fake accounts on the major social networks. Now, let’s take a look at what can we do with those fake social network accounts. Also, let’s not forget that my goals here are to penetrate specific individual’s home network (in this case my own…

  • How to Prepare for Cyber Reconnaissance?

    How to Prepare for Cyber Reconnaissance?

    In my previous post, How Can I Successfully Hack My Home Network? I set the stage for my “Hacking my Home” activities. A possible scenario here is that I am given the task to penetrate a high-profile target’s (i.e., myself 😀) home network and collect as much information to use for malicious purposes. Before I…

  • How Can I Successfully Hack My Home Network?

    How Can I Successfully Hack My Home Network?

    This morning I was looking at our company’s e-mail gateway and cleaning some of the quarantined messages when I got reminded that while my company’s digital infrastructure may be well protected with firewalls and e-mail gateways, my home network can be wide open and vulnerable to attacks. Like everyone else, I try not to spend…