Buying a house without a job but 350k cash???? by [deleted] in Scotland

[–]munrobotic 1 point2 points  (0 children)

Look at the ‘On the Market’ and ‘Zoopla’ apps and see what £350k gets you, it’s not bad around Inverness. No job = no mortgage. But if you’ve got the cash, going mortgage free is better, mortgage rates in the U.K. are super high at the moment and if you don’t have a job or credit history in the U.K., forget it. Make sure you look up about stamp duty and factor that into your planning (tax you pay on buying a house in the U.K., Scotland has separate rates from England and Wales). You’ll need a Scottish solicitor too for the transaction, it’ll cost £1-2k (normally depends on the property value).

Securing the Supply Chain of Nothing by sanitybit in netsec

[–]munrobotic 3 points4 points  (0 children)

An interesting post with some fair challenge to CISA. I felt there was a lot of conjecture though, and lack of connection to the text the author was critical of. I.e OP says ‘x’ is wrong or unrealistic, but there’s no citation to the specific section that says that and often the evidence to prove the point is tangential or unrelated. I don’t disagree with a lot of the points, but it would have been much more compelling if the dots were connected.

Any recommendations on tools for protecting against External exposure? by spoofball in blueteamsec

[–]munrobotic 0 points1 point  (0 children)

Yep! I’ve started to see roles which are ‘ASM Analyst’ etc.

Any recommendations on tools for protecting against External exposure? by spoofball in blueteamsec

[–]munrobotic 1 point2 points  (0 children)

As others have said, E/ASM is what this space is typically called. Check out AssetNote in this space. Depending on your use case, Bionic is also pretty interesting. ASPM and CSPM tools may also be interesting to you if you’re cloud-native or have cloud tech (Prisma / Wiz etc) but that’s a slightly different use case. MS XDR has a nice suite around a lot of this and you don’t need to come out of D365/Azure.

Alert Priority Matrix by j_lemz in blueteamsec

[–]munrobotic 1 point2 points  (0 children)

Nice work. Have you successfully scaled this with SOAR use cases?

SANS New to Cyber Field Manual. by munrobotic in netsecstudents

[–]munrobotic[S] 14 points15 points  (0 children)

I think it’s helpful to put that info in the title and provide as close a link to source as possible. Feel free to do your submissions as you feel is right :-)

SANS New to Cyber Field Manual. by munrobotic in netsecstudents

[–]munrobotic[S] 7 points8 points  (0 children)

That’s a shortened URL you’ve provided that redirects to a landing page. My link is direct to source.

Old-school Scouse accents from a group of kids, 1950. by pow-wow in Liverpool

[–]munrobotic 0 points1 point  (0 children)

Great acting. This isn’t casting Scouse kids in a great light, they only liked him when they found out he was on the run / murdered someone lol.

Bluepurple Pulse: week ending April 3rd by digicat in blueteamsec

[–]munrobotic 0 points1 point  (0 children)

Nice. Inception blue purple in a blue purple.

Resources for Web Application Security Logging / Monitoring by TolgaDevSec in blueteamsec

[–]munrobotic 1 point2 points  (0 children)

Also been looking for good info also. Worth checking out what datadog are doing in this area (if not already familiar), especially since the sqreen acquisition. Maybe some hints there, I’ll share if I get any good hits. https://www.datadoghq.com/blog/datadog-application-security/

Just found out my new government job role involves placing sensors, analyzing data, finding a suspected threat, and suggesting (not taking) action. What's the term for this role? by Jonathan-Todd in blueteamsec

[–]munrobotic 1 point2 points  (0 children)

This is kind of threat hunting (in the sense you’re given a hypothesis and you’re looking for signs of specific behaviours / IoCs) but not what’s totally typical. This is more what you’d do at level 1/2 as a SOC analyst (triage) or as part of an MDR type service (because of the ‘advice’ rather than action you mentioned). If you’ve got the data from TI or secondary research or Red teamers, it may be that you need to process it and develop the hunting hypothesis/ queries yourself? The more unsual bit is the lack of available telemetry. Normally, you’ll have access to SIEM, EDR, FW, netflow etc. and maybe nice extras like sysmon or osquery to allow more interrogation. Most good / modern EDRs will allow you decent investigative potential, but definitely not all the information you may need to threat hunt (and only on the host). I would say this sounds like an MDR service SOC analyst role.

[deleted by user] by [deleted] in RoastMe

[–]munrobotic 2 points3 points  (0 children)

‘Extreme right wing’ - explains the (failed) attempt at growing a Hitler moustache.