The events that transpired this week in the US are sad and depressing to say the least, but criticizing people for forgetting to lock a computer in such a situation isn't a wise move. Life preservation takes precedence over security policies, full stop.
MISP is a great platform for intelligence sharing and collaboration. I have had it on my mind for a while now but only today did I get the chance to learn more about it. This post is the first in many to come about MISP and use cases I will be building around it.
We all need a way to send our friends the latest memes but that doesn't mean we should sacrifice our privacy and data control while doing so. In this post, I share some of the services I use to protect my privacy and remain productive.
One question in CyberDefender's most recent challenge taught me something new. The question asked you to listen to the audio stream that can be found in the PCAP file to find the flag and claim the points. I never knew Wireshark supports doing this hence this TIL.
The way pinned messages work in Slack is one of the things I find frustrating about the platform. If I pin a message, I expect it to remain visible in the channel not tucked into a side tab. This post outlines a rough PoC for a Slack application that can help you "truly" pin your messages.
It's been a while since I did any forensic challenges, so I was excited when I saw this new challenge from CyberDefenders. Even though I never did any macOS forensics, I did quite well on this challenge (solved 14/16 questions) and learned a bunch. This post is my attempt at a quick recap.
Phones are an integral part of our life; we use them to take pictures, write journals, browse social media, work on our tasks, and even have important work meetings or edit sensitive documents. In this post, I share with you one useful habit I developed over the years when it comes to phone hygiene.
Many macOS applications come in DMG format, which is perfectly fine until you need to deploy one of these applications using your enterprise MDM solution. Most MDMs only work with PKG files so you must convert the application from DMG to PKG before you deploy it.