↧
Data Exfiltration with Iodine
Recently I was working on a project with Nate where we were trying to circumvent our client’s internal network controls in order to send “sensitive” data out of the company via the Internet. While our...
View ArticleAnalyzing DNS Logs Using Splunk
Back in December of 2011 I wrote a post on the ThreatSim blog called “Fighting The Advanced Attacker: 9 Security Controls You Should Add To Your Network Right Now“. One of the controls we recommended...
View Article13 Practical and Tactical Cloud Security Controls in EC2
Most cloud security blog posts, news articles, and other guidance found online address risks such as governance, contract language, forensics, and other higher-level topics. There isn’t a lot of...
View Article
More Pages to Explore .....