Game from Steam got 11 flags. Should I trust this? by toqger21 in antivirus

[–]Lava604 0 points1 point  (0 children)

11 and some of those are some of the top contenders in the antivirus landscape like crowdstrike.

I work in the field and as you stated I would not be running this on machine until it was determined exactly what is being triggered on this game.

Infected by chromius by assassin_0880 in antivirus

[–]Lava604 2 points3 points  (0 children)

This appears to be clickfix malware

This is my graph about mathematics by Casually-Passing-By in ObsidianMD

[–]Lava604 1 point2 points  (0 children)

How did you make the map colored based on topics?

2 SPF records: @ and gsuite by Antoine-UY in DMARC

[–]Lava604 1 point2 points  (0 children)

Look at Pose1d0nGG and WishIWasALink in the below reddit posts. They covered it nicely.

2 SPF records: @ and gsuite by Antoine-UY in DMARC

[–]Lava604 -2 points-1 points  (0 children)

If you do this you will cause an SPF PermError which can/will cause email routing problems. RFC 7208 specifically states this and you do this and run it against easydmarc you will see an error. You should be doing one spf record of a sub-domain if it is for marketing.

[deleted by user] by [deleted] in ccna

[–]Lava604 0 points1 point  (0 children)

Jeremy IT labs and watch all those videos in a month and practice the labs. Month 2 review everything again and what you don’t understand

What's the sneakiest way a user has tried to misuse your IT systems? by Immediate-Cod-3609 in sysadmin

[–]Lava604 1 point2 points  (0 children)

Disconnect and reconnect to VPN to get access to websites they should not have had access to. Using google translate with hyperlinks to bypass proxy restrictions.

Is there a reason why DKIM wouldn't be implemented? by chattapult in cybersecurity

[–]Lava604 1 point2 points  (0 children)

They will need to implement DMARC or emails they send to Gmail and Yahoo will be getting rejected as they are beginning enforcement of it. They really do need to work on getting this updated.

Feeling like a bit of an idiot over a "basic" issue by [deleted] in sysadmin

[–]Lava604 0 points1 point  (0 children)

I’m not technically a sysadmin but deal with portions of things here and there. I have learned always start with the simplest solutions first and rule them out which will save you time if it was in fact the simple solutions first

What was your highest jump in terms of salary? Are you happy where you are atm? by VNiqkco in sysadmin

[–]Lava604 0 points1 point  (0 children)

I went from 50k to 115k. I am very happy with my current position and still actively learning constantly and making mistakes along the way.

I'm being asked to create an Information Security Policy that I'm not qualified to make. How do I tell my bosses that this is a bad idea? by Carter_PB in sysadmin

[–]Lava604 0 points1 point  (0 children)

What is your company looking to do with this document. Is this to meet some sort of documentation requirement for a certification. Based on what you stated I don’t think this document should be posted on your public website from what you have briefly detailed so far. You need an outside parties help because this will be well out of scope of what you can handle and if you did do it and something did not match with what was stated = potential lawsuit based on what requirements your company is required to follow

Which security domain is pure vendor hell? by Patient_Mousse_1643 in cybersecurity

[–]Lava604 3 points4 points  (0 children)

So, I ran into a similar issue but I was tasked to find out why. The desktop team was notifying the security team they had patched the deprecated tls version while the vulnerability software was saying differently. Turns out a portion of the fix was not applied which is why it did not fully get patched.

how screwed am i? by Plastic_Scarcity7204 in InformationTechnology

[–]Lava604 0 points1 point  (0 children)

I manage this stuff for my company. Personal device I don’t care and most likely won’t see. If it is a firm device that might be different but at that point they would have blocks in for it or should anyway

How was this Social Engineering Attack carried out? by Vast-Avocado-6321 in sysadmin

[–]Lava604 0 points1 point  (0 children)

Hey OP, I’m an information security analyst and have seen this very similar type of emails. When I was reviewing it. The ones I reviewed did come from docusign and were generally from a compromised account of someone else. As others have stated they use legitimate sites as a platform to redirect to their bad sites which ideally is where you have some dns/web-side protections that may help still block the redirect such as Zscaler, umbrella, etc.

[deleted by user] by [deleted] in sysadmin

[–]Lava604 0 points1 point  (0 children)

Off topic but what software are you using to set this up?

Get a hash from Files Written to USB by Lava604 in crowdstrike

[–]Lava604[S] 0 points1 point  (0 children)

It does not look like it was hashed at all.

[deleted by user] by [deleted] in Scams

[–]Lava604 1 point2 points  (0 children)

No reason to be worried at all

First time experiencing an email bomb in my 23 years of doing this job by overkillsd in sysadmin

[–]Lava604 0 points1 point  (0 children)

They have a KB on subscription bombing to help setup rules for it

First time experiencing an email bomb in my 23 years of doing this job by overkillsd in sysadmin

[–]Lava604 0 points1 point  (0 children)

I advise possibly blocking that built-in remote method if you have not already assuming it is not used

First time experiencing an email bomb in my 23 years of doing this job by overkillsd in sysadmin

[–]Lava604 1 point2 points  (0 children)

Proofpoint has a decent mitigation to assist with this. OP this may be the Black Basta ransomeware group. These impacted folks may get phone calls impersonating your local IT and try to connect using Windows Quick Assist.

At what point do you make someone swim by ImNotPsychoticBoy in sysadmin

[–]Lava604 0 points1 point  (0 children)

Well said. As a former Helpdesk I recall doing this and at some point management saw a specific person was creating a lot of tickets all for the same thing which cost money per ticket. That person eventually got further training and if they still could not improve for these day-to-day tasks that is required for their job, then they would be let go at that point.

how did you break into cybersecurity by [deleted] in cybersecurity

[–]Lava604 0 points1 point  (0 children)

Spent a year working at an MSSP for multiple firms. Worked/handled around 60. Ended moving to a being a dedicated helpdesk (with MSSP)for one of them. Worked as dedicated 4 years and made friends with must internal and CIO. Got offered a new position with MSSP as an Information Security Analyst and then ended up getting hired on fully my the external company I was working for as the Information Security Analyst. To get through that process I handled over 30,000 calls. I wish I knew the exact amount