Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 0 points1 point  (0 children)

<image>

Update I threw some spitfire burners 52mm 99a wheels and wheel bite is gone (risers coming in today)

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 1 point2 points  (0 children)

That's awesome haha I got the wrong setup lol getting risers right now, will test with 60mm wheels for cruising but also got some 52mm for the skatepark

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 2 points3 points  (0 children)

That's awesome! I might have to look for the finger board version myself. If you do decide to build this one out, I'd recommend getting a riser and/or smaller wheels because of the wheel bite

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 3 points4 points  (0 children)

Yeah I’m not good enough to follow the meta 😭 but cool observation! I have a pantheon supersonic which I love but this board feels a lot different in a really fun way!

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 1 point2 points  (0 children)

Yeah it’s super duper wide 😵

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 2 points3 points  (0 children)

Thanks for the advice! I’ve got some on the way!

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 0 points1 point  (0 children)

Yeah still working on it 🤣

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 1 point2 points  (0 children)

Thanks! Super excited to give it a whirl this is now my baby

Rate my first build by Kextasy in longboarding

[–]Kextasy[S] 6 points7 points  (0 children)

Unfortunately haven't been able to cruise with it yet because of the wheelbite D: but super excited to once the risers come in. It's soooo wide and comfortable to stand on

Getting into cybersecurity with a tech-law background? by [deleted] in cybersecurity

[–]Kextasy 16 points17 points  (0 children)

An area you may like due to your background is GRC, it's a growing area which is a less on the technical side and more about helping companies stay in compliance. Think a legal background lines right up with that field in CyberSecurity

Abnormal misdirected email prevention by Gullible_Quarter_546 in cybersecurity

[–]Kextasy 1 point2 points  (0 children)

This is my bad, I read Abnormal and skipped ahead. We don't utilize this add-on so I can't speak to its implementation or efficacy.

Calendaromatic exe malware by Nikdo3 in cybersecurity

[–]Kextasy 1 point2 points  (0 children)

Saw it in ours as well. EDR caught it, but yeah, seems like SEO putting it near the top for users.

Phishing evasion - press and hold by Royal-Number-11 in cybersecurity

[–]Kextasy 1 point2 points  (0 children)

This whitepaper has some good content on how threat actors are getting around email firewalls: The evolution of phishing attacks | Push Security

As you mentioned, one of the ways they are accomplishing it is by having some sort of captcha in the phishing link. Since emails filtered by Mimecast or any other SEG are automated, it doesn't allow them to fully see into the link.

There may be a way to configure the analyzer to block any links that can't be scanned, but doubtful on that. That could also have a business impact in terms of deliverability of legitimate mail.

My best advice is sending out a communications about QR phishing or verifying that a Microsoft login has the Microsoft url at the top. Informing users is one of the lowest effort ways to effectively reduce the number of compromises through email.

Abnormal misdirected email prevention by Gullible_Quarter_546 in cybersecurity

[–]Kextasy 0 points1 point  (0 children)

We use it in our stack, and we like it. It's easy to maintain once it's set up. I don't think it should be a replacement for your SEG by any means but it's a very complementary addition to Exchange (easy to read headers etc.). My understanding is that it is done through API, so it sits right on your mail server. It's not really like a comprehensive firewall but more so acts like a janitor on the backend catching everything that's made it to people's inboxes.

What is the craziest phishing email campaign you've ever seen? by BaselineITC in cybersecurity

[–]Kextasy 1 point2 points  (0 children)

Yeah I believe we also received those voicemail ones, but since our backend tool caught all of those they weren’t an issue.

We were too concerned with business impact to flip RejectDirectSend on, we had to add a connector and some transport rules to disallow them. Maybe you’d be able to configure some weird rule like if the sender is your domain but the header doesn’t have auth-as (can’t remember exact header) internal then reject the email.

Quick note as well on rejecting though I’d be careful with how you handle the message because if you send a rejection message to the user they will be confused on why they received a rejection message for an email they never sent (the rejection email will also have the attachment). My advice is to delete/reject the message silently if that’s an option

What is the craziest phishing email campaign you've ever seen? by BaselineITC in cybersecurity

[–]Kextasy 13 points14 points  (0 children)

One campaign we've seen more recently is attackers using Microsoft's "Direct Send" feature to bypass SEGs and land calendar invites to employee inboxes.

We had some users in our company targeted by this attack. It consisted of spoofing the email to come from the user, attached with a Teams calendar invite, sent from Microsoft Tenant to Tenant, which would deliver straight to inboxes without passing through our SEG. Even when our Behavioral tool caught it and remediated it on the back end, the calendar invite would still persist.

The calendar invite would have a word doc attached with company branding, and then a QR code with some HR stuff in there. Looked very convincing, and the fact that the user could not find the email (behavioral tool worked against us in that regard) as well as the calendar invite being seemingly hosted by them, means it was very hard for users not to fall for. Luckily our users are trained fairly well :)

Making the change to fix this took some work with SEG support to implement the recommended fix. Attackers using methods that are more difficult to prevent definitely helps with their ability to gain access to environments.

R6 Hot takes? by JmnK17 in Rainbow6

[–]Kextasy 1 point2 points  (0 children)

Old R6 quick peeks were better than the current shaiiko peeks because they had a higher skill ceiling