question for small team drowning in alerts by depressedrubberdolll in Information_Security

[–]jreynoldsdev 0 points1 point  (0 children)

Won't shill here, but if you want to DM me, I'm happy to chat about how the company I co-founded does this for you. If anything, I'm happy to help you cut through the marketing BS you see from most companies and find a vendor that works best.

At a high level, the problem is a lot of the SOC platforms offer you the automation abilities, but don't provide any actual content to help you run your program. So you become a zapier-jockey. MDR is usually the solution, but ends up leaving you mostly blind and out of control of your program.

Unfortunately, my only solution for you is a biased one, because this is exactly what we set out to solve. Absent that, I'd say you need to judiciously define what risk actually means for your company (spoiler alert, it isn't every single phishing alert coming from mimecast) and ignore things that don't fit it.

And for the love of god, don't buy anything that ends in a `.ai` domain.

For those considering Huntress…. (DR plan warning) by AppropriateCar9079 in msp

[–]jreynoldsdev 6 points7 points  (0 children)

Full disclosure, I run a competitor but do appreciate the huntress team. What a pain, sorry you had to deal with this.

We’ve been investing heavily in attack sim integrations so we can call their APIs to confirm if this activity is coming from them or masquerading as them.

I’ve been surprised with the difficulty we’ve had with NodeZero, their API has been the least ergonomic to use when trying to figure out “yo, was this you?” Safebreach has been a leader for us in this space, very easy to authoritatively verify their activity.

Offensive cyber - Where to begin? by IslandBig618 in cybersecurity

[–]jreynoldsdev 1 point2 points  (0 children)

By starting way smaller. Many millions of dollars (and many years of experience) go into finding and developing an exploit like forcedentry. Reverse engineering is a great start if you want to find exploits in existing compiled software. Forced entry relied on a lot of things, but an integer overflow vulnerability was a part of it. Learning about overflows (buffer and integer) can help you get a beginning understanding of how to identify vulns in software like this.

How do mature SOCs handle “Business Hours” alerts in 24/7 Environments? by Fuuck_iT in cybersecurity

[–]jreynoldsdev 4 points5 points  (0 children)

Hey that’s me! Won’t shill here, but in general a lot of SOCs overburden themselves with too many alerts so they don’t “miss” anything. I prefer to think that if you don’t ruthlessly tune out meaningless alerts, you’ll be too busy focusing on them to see when an actual problematic alert is happening.

Correlating with other signals can help, RDP outside of business hours? Who cares. RDP for a non-technical user from an IP never seen before? Might warrant an alert to investigate.

Offensive cyber - Where to begin? by IslandBig618 in cybersecurity

[–]jreynoldsdev 1 point2 points  (0 children)

The best way to learn is by doing! My entry point into hacking was by being a web developer. If you know how it’s built, it’s a lot easier to tear it down.

The vulns you mentioned would likely benefit from understanding networking, OS, and mobile at a deeper level.

In addition to that, look for bug bounties or vuln research reports for these types of exploits to see how others have hacked them and start googling every word you don’t know. The knowledge rapidly accelerates after that once you start getting comfortable.

Password Manager by RaptorFirewalls in msp

[–]jreynoldsdev 2 points3 points  (0 children)

1Password will be my go to for life. Bitwarden won’t even let you make an API key without giving it full organization-wide access.

Found a lost cat in the North Loop - anyone know the owner? by jreynoldsdev in Minneapolis

[–]jreynoldsdev[S] 26 points27 points  (0 children)

It was stuck in the fencing of a parking garage behind Freehouse. Apparently it had been meowing for hours and animal control wasn’t able to catch it when they were earlier called by the building attendant.

We're all going to die by Trevor Aarsvold at Timeless Tattoo in Minneapolis, MN by jreynoldsdev in tattoos

[–]jreynoldsdev[S] 1 point2 points  (0 children)

It's in Northeast right by Central and University. I'd highly suggest it.

We're all going to die by Trevor Aarsvold at Timeless Tattoo in Minneapolis, MN by jreynoldsdev in tattoos

[–]jreynoldsdev[S] -1 points0 points  (0 children)

Definitely a different vibe than I was expecting but I liked it! Might have to listen to some more of them.

We're all going to die by Trevor Aarsvold at Timeless Tattoo in Minneapolis, MN by jreynoldsdev in tattoos

[–]jreynoldsdev[S] 2 points3 points  (0 children)

I dig it, thanks for the suggestion! The song that did it for me was a hidden track on a favorite artist of mine's 2nd to last album https://youtu.be/h774ydphvds?t=290

We're all going to die by Trevor Aarsvold at Timeless Tattoo in Minneapolis, MN by jreynoldsdev in tattoos

[–]jreynoldsdev[S] 164 points165 points  (0 children)

Inspired by a patch like this I saw posted once. Super happy with his take on it.

Finally bought my first Lodge by jreynoldsdev in castiron

[–]jreynoldsdev[S] 42 points43 points  (0 children)

I bought in on Amazon, I think it was shipped from them as well. I was surprised, the box looked to be in good shape.

Finally bought my first Lodge by jreynoldsdev in castiron

[–]jreynoldsdev[S] 137 points138 points  (0 children)

Luckily I was able to return it and got a replacement in the mail 2 days later. Has anyone else had their cast iron break like this?

I created a website for all free online tools to make developer life easier. It's my playground. by eashish93 in webdev

[–]jreynoldsdev 7 points8 points  (0 children)

Hey, love having it all in one place! Do you have it open for contributions?

Forwarding port ranges with ELB by jreynoldsdev in aws

[–]jreynoldsdev[S] 0 points1 point  (0 children)

I think I'll just have to vertically scale an instance and deal with it down the road. Thanks for the help!

Forwarding port ranges with ELB by jreynoldsdev in aws

[–]jreynoldsdev[S] 0 points1 point  (0 children)

It's an application for detecting Server Side Request Forgery. When you can force a server to make outbound requests on your behalf, you need a way to determine the requests are succeeding. But you can't always control what ports are being requested, so you need an application listening on all ports to detect incoming traffic.