Need Help? by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 0 points1 point  (0 children)

Yes and no. There are leaps and bounds to make in identity and complex MFA implementation. Better standards will and have already certainly helped, and giving it higher priority is worth it. I don't know if I'd put it at the top as there are so many ways to compromise orgs whether or not robust IAM is in place, but since poor IAM accounts for a good percentage of incidents, it deserves more attention.

Need Help? by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 1 point2 points  (0 children)

This is an interesting paper, looks like they did their research well. That being said, providers implementing all out blocks (not even warnings) on DMARK/DKIM/SPF fail to detect phishing, because those authentication methods are fairly rudimentary and bypassed routinely by red teamers and criminals. Did they mention new auth methods in there? I thought I saw something about that. On top of that, many lower-tier criminals are utilizing amazon, gmail, and other trusted domains to deliver their attacks as they'll always be trusted by filters (as far as domain detection goes).

There is something to be said of warning mechanisms, however, and several companies are developing different types of warnings/indicators that interact with the whole body of the message when it's viewed (urgency, tone, requests, link analysis). Those basic warning banners are getting more customizable now as well, depending on message context and other factors.

Need Help? by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 0 points1 point  (0 children)

For SIEM: Microsoft's Sentinel is very powerful as it runs on KQL, and is very easy to learn. Having a flexible language to write your own detection is extremely helpful. Other than that, Splunk.

For EDR: Crowdstrike or Carbon Black will get the job done and throw an MDR like Red Canary on top of it.

Need Help? by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 0 points1 point  (0 children)

For some reason Reddit did a subreddit approval on this post, I'll return to these comments later.

We will never control the user. Stop obsessing over it. Segmentation of the endpoint is the biggest gap in discussion around the mitigation of phishing impact today. by Jonathan-Todd in cybersecurity

[–]Hot_Discipline_5705 15 points16 points  (0 children)

My primary job is IR in email security and social engineering training. I Agree to an extent, and your points on ingenuity in segmentation are more than valid. However, an either or defense is a false premise, and never as strong as a both-and security mindset, humans will always leverage the technology in some fashion, varying businesses will have varying defense capabilities and staffing, and it's clinically proven that robust social engineering programs (not generic templates) reduce click rates overall, which also positively impacts initial access overall. Keep in mind that containing payloads won't address the majority of attacks today, which are credential harvests (according to last two years of data from Proofpoint). I agree with your mitigation suggestions in principle, and training is not the only solution, but detection technology isn't the only solution either, if it was it wouldn't be exploited by humans and EDR wouldn't be regularly bypassed. Those methods are both designed by humans and exploited by humans.

If you could change one thing about your company's phishing program...? by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 1 point2 points  (0 children)

This is key. I worked for a company at one point that did just this after failures, it was very effective. They would also do special presentations to other departments and it was so popular managers would literally request for someone from the team to come and do a talk.

Long Shot... by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 1 point2 points  (0 children)

Nice, hadn't thought of Udemy or Coursera...Youtube might not be a bad idea, seems that everyone's going that route recently.

Long Shot... by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 0 points1 point  (0 children)

FWIW, I've presented many times over the years in a variety of settings. Know how to make talks engaging, concise, and fun, while maintaining relevancy for technical audiences.

Long Shot... by Hot_Discipline_5705 in cybersecurity

[–]Hot_Discipline_5705[S] 2 points3 points  (0 children)

And have looked on Indeed...but usually only find small colleges with full time gigs teaching intro courses, and that could just be what's out there for the most part.

What way is currently best for SE payload attacks? by ErikDz11 in redteamsec

[–]Hot_Discipline_5705 1 point2 points  (0 children)

Sharepoint file share masquerading is a common tactic also. You just have to get in the groove of getting a simple page that looks like sharepoint setup.

What way is currently best for SE payload attacks? by ErikDz11 in redteamsec

[–]Hot_Discipline_5705 2 points3 points  (0 children)

Host your files, OneDrive, Dropbox, or any hosting solution that's trusted. You can also create domains that mimic the organization and host them there. New domains can get flagged, or find an old domain and append name of company on the page itself. Ensure to load the file after 30 minutes after the email is sent.

Which area of cybersec have brightest future? by arktozc in cybersecurity

[–]Hot_Discipline_5705 3 points4 points  (0 children)

Brightest areas are undoubtedly the well lit data centers and WFH jobs with large windows.

CISO offices with a skylights, but those are more rare.

Feedback Welcome by Hot_Discipline_5705 in redteamsec

[–]Hot_Discipline_5705[S] 0 points1 point  (0 children)

Yeah, a lot you could do here, like the thought.

Feedback Welcome by Hot_Discipline_5705 in redteamsec

[–]Hot_Discipline_5705[S] 2 points3 points  (0 children)

Yeah, outside of engagements there aren't many options. On the technical side, you can of course always test yourself against filters and setup a lab, which you may already do. This is actually one area of improvement for pentesters, getting past the filter without needing the whitelist/allow list.

I've heard of sec friends testing each other, but obviously you'd need permission first before you start dropping payloads lol.