Had fun designing and printing in 3D a house to be built, for someone in the family. It started with me photographing some entrepreneur sketches for the house they are planning to build.
Supporting open source, Cyberpunk/n0where.net, gives both practical tips and news for tools that a cyber security geek would love. And the best part is its rating feature for all published articles. E.g., here I found the SELKS distro.
Check out these categories I found especially interesting:
Another “black-hat” site, spyhood, for security practitioners who like to learn from cyber security tools, games and news you can learn from.
The guides are rather trivial (or made trivial:)) with illustrations, step-by-step instructions and screenshots. Just played with the security camera recently.
I have been using/playing with Azure lately. Everything from server builds, Azure AD, network security and all those magical app services and microservices for AI, cognitive behaviour, threat analytics and more. Playing with Azure is free for a limited subscription with enough cash to play with most (although not resource intensive) services. See here.
Azure security enables you to protect, detect and respond your services. What I find even more interesting from a security perspective is how you can penetration test your Azure ser vices using Kali for Azure. Have not yet tested it out myself, but plan to. It can be acquired here.
Just make sure you let Microsoft know if you plan to pentest something – as you probably would if you tested your corporate network:)
…Google says. Or they don’t actually say so, but their BeyondCorp approach to enterprise security certainly address it. Instead of building a perimeter sound enterprise network, they push security to whom shall access what without building a wall around it. I have tried to split this graphically in four as follows: Continue reading “Move away from the Perimeter”
Looked into the Android SpySMS torjan as they say it has infected 40k users phones. This Mobile Trojan is using SMS as C&C protocol the way IRC C&C were used by PC Trojans back in the days. Got me thinking that the reliable SMS protocol is a nice protocol to control the android bots. The way this app try to block anti-virus from running and the long list of banking apps it controls is rather interesting as this has historically been more adapted by PC trojans and malware.