Threat Intelligence and Other Contemplations…

Author: kodama

  • Arc (Awesome) X

    Greetings fellow cyber-sleuths! If you’ve been traversing the ever-evolving landscape of cybersecurity, you know the journey can be relentless. Not only must you stay ahead of the latest tech trends, but those certifications demand a never-ending stream of continuing education units (CEUs). In such a ravenous ecosystem, training providers are as plentiful as stars in…

  • Watchman on the Wall

    What is cyber threat intelligence (CTI)? The term is about as elusive as the color of my skin.

  • Information Security Policies

    If you read my OMSCS CS6035 review and surmised that the subsequent one would arrive in August, kudos to you – your intuition was spot on! An all-star cadre of Milton Mueller, Andreas Kuehn, and Beau Sommerville lead this introduction into Information Security Policies, PUBP 6725. The course is one of the two core classes…

  • Move Over, MOVEit, for Open-Source

    PrefaceReaders of my blog will know that I typically maintain a pretty casual tone. This post was originally written for an academic setting, so hang with me if you find yourself slogging through a bit denser material this time. AbstractThe MOVEit transfer campaign, orchestrated by the CL0P ransomware gang, targeted a wide range of victims,…

  • Mal de Debarquement Syndrome

    Mal de Debarquement syndrome; French term for “sickness of disembarkment” and describes the feeling a sailor might have after receiving their sea legs and returning to shore. You know your back on stable ground, but the world still feels like it’s swaying from side-to-side. It’s a good metaphor for the experience of emerging from crawling…

  • Know Your Crypto

    If you are considering expanding your knowledge of cryptocurrency and have looked into certification options, you may have come across the Certified Cryptocurrency Intelligence (CCI) course offered by Blockchain Intelligence Group (BIG). Before jumping in and paying the $$$, you may want to read on to better decide if this course is a good fit…

  • Em🤔ji Intel: Spotting Mass-Generated Messages

    Ever gotten one of these messages? “Hi YOUR NAME HERE, Your strong background and experience caught my eye and I wanted to connect. I’m partnering with a hiring team at COOLEST COMPANY EVER looking for a Threat Services Vulnerability Analyst… blah, blah, blah… Thank you for your time! GENERIC NAME Recruiter at BEST RECRUITING COMPANY…

  • Let’s Talk TikTok

    TikTok has been making the news a lot lately with States like Montana electing for an all out ban of the popular social media platform. If you are not already familiar with the various arguments for or against, well, here’s the quick and dirty run down. For Banning TikTok:– Bad for the kiddos– National security…

  • Transforming with Holehe-Maltego

    Hello Maltego! A software that’s all about Transforms? Sounds like my kind of software. It’s free?! Could this get any… oh wait… Ok, so join the club of hundreds if not thousands of software options with a free download and premium subscriptions. From video games to corporate level software solutions, it’s the same old bait…

  • Anonymizing Your Sock Puppets

    You’re not real without your phone! At least, that seems to be the conclusion much of internet has reached. When so much of the online ecosystem revolves around tracking and selling your personal data, there are very real financial concerns when it comes to validating the identity of users for major social platforms. Unfortunately, blending…