An Introduction To Exploit Kits

I published an introduction article on exploit kits on the blog at Ipswitch : An Introduction To Exploit Kits

.

The article covers why attackers use exploit kits, how they can select their targets, how users get infected through exploit kits and what you can do to improve your resilience against exploit kits.

Doing open source intelligence with SpiderFoot (part 2)

I did an earlier post on gathering open source intelligence with SpiderFoot. This post is a small update to incorporate the new version of Spiderfoot that was released recently.

A new version of Spiderfoot was recently released, including some extra modules. In my earlier post I described how I adjusted and added some modules. The new release of Spiderfoot contains part of my changes to the XForce module.

My initial change to Spiderfoot included aRead more.

Will Blockchain Technology Replace Traditional Business Models?

I had to brush up my knowledge on the blockchain technology and decided to write a piece about it on the SecurityIntelligence.com website : Will Blockchain Technology Replace Traditional Business Models?

The article contains a short introduction on what the blockchain technology is and how it works. I conclude with some remarks how blockchain technology could remove the middleman (banks, etc.) for financial transactions.

Whitelist e-mails in Gmail (for example MISP notifications)

Recently I noticed that some of the MISP notification e-mails ended up in my spam folder. I use Gmail linked to my personal domain.

You might argue that processing MISP mails, potentially containing restricted information, via Gmail is a problem. The MISP notifications however are GPG-encrypted so this limits a potential problem.

Whitelisting e-mails in Gmail is not limited to MISP only but I cover this use-case as it caused me some annoyances.

The firstRead more.

HTTP 304 and Apache sinkhole

This is a short post, put here as a “reminder to self” on browser caching.

A colleague recently set up an HTTP sinkhole with Apache. The setup redirected all the user requests to one specific resource.

When deploying the sinkhole, the web server logs showed that the first requests where logged with HTTP status code 200 (“OK”). The next requests however were logged with HTTP status code 304 (“Not Modified”).

The HTTP 304 code basicallyRead more.

Security Training for Incident Handling: What Else Is Out There?

I had a guest post published on Security Training for Incident Handling: What Else Is Out There?.

This post is a follow-up to an earlier post (Security Training for Incident Handlers: What’s Out There?) that points out some alternatives for training for incident handlers.

Proper Script Management: A Practical Guide

I had a guest post published on Proper Script Management: A Practical Guide.

The post lists some best practices when developing your scripts and how to measure the performance of your scripts.

Using Geolocation Data to Benefit Security

I had a guest post published on Using Geolocation Data to Benefit Security.

This post lists how you can enrich your information with geolocation data.

Sharing Encryption Keys: A Practical Example With GPG

I had a guest post published on Sharing Encryption Keys: A Practical Example With GPG.

Stay Up-to-Date on Security News with OPML feeds

In 2015 I did a posting on the Security Intelligence blog on How to Stay Up-to-Date on Security Trends. The post describes how you can streamline the process of following different news and threat information channels, classify them and bring them to good use.

One of the tools that you can use is RSS feeds. I personally use a setup of fever to grab different RSS feeds and then have them delivered in one centralRead more.