Free content on jobs and careers in cybersecurity and tech. Also salary negotiations for women. Sign up for my email list to learn something new in cybersecurity almost every day.
#cybersecurity
#jobs
#career
#salary
Twitter accounts sharing video from Ukraine being suspended. Researchers concerned that suspensions could be part of mass reporting campaign to disable OSINT accounts during Russian invasion. [Literally JUST tweeted thread about Twitter manipulation.]
Google Chrome DNS Security Bypass: Google Chrome overrides system DNS settings in some cases, bypassing third-party security services and tools | by Teri Radichel |
#cybersecurity
| April 19, 2021
Microsoft is going to enforce number matching for MFA notifications starting February 27, 2023. Related to the Oktapus blog I just published and issues with MFA notifications.
What nerds do on Friday night:
The paperback version of my book will be online in 72 hours.
Some corrections pushed out for ebook.
I can’t look at it anymore. If you find errors please DM.
Thanks ❤️
My book is now for sale on Amazon. 350 pages and a year’s worth of effort. I sincerely hope it helps. Additional chapters, more content than my blog, and lots of edits. Printed book to follow. Please DM any issues or questions. Or come to my
#RSAC
talk tomorrow. Thank you!
Still seeking a lady that wants to take my cloud security class in Melbourne, Australia for FREE Nov 11-15 at the Sheraton Four Points. It’s a 5 day class $2500 US. Please contact me on LinkedIn for more information.
A friend posted this about airport security but it applies to some
#cybersecurity
architectures as well. 😆 Think holistically about cybersecurity architecture and design.
Just found that periodic screen shots of my Windows desktop on an Azure VM showing what I have open and am working on is going into some folder called FeedbackHubLog on Azure. What.
Microsoft says they seized this domain. Security Trails reports it's been hosted on Microsoft IP addresses for a while. Some of the subdomains were running on AWS infrastructure according to this site.
A post I should have written a long time ago. Written quickly as I’m busy.
How to Inspect Network Traffic. A few tips on finding what matters on your home network | by Teri Radichel | August 26, 2021 |
#cybersecurity
#networksecurity
#networkmonitoring
What's in your cloud? Thoughts on the Capital One breach by a former Capital One software engineer, team lead, cloud engineer, and security employee
#capitalone
#databreach
#cloudsecurity
Designing a modern serverless application with AWS Lambda and AWS Fargate [TR: On top of being cool from a serverless perspective, watching for changes in source code used by your company is cool from a security perspective]
Stuck at home? Why not learn something. Cybersecurity fundamentals and risk management to reduce the chance of an attack in your organization. A new way of looking at old problems. 2019 was the worst year on record for data breaches. Let’s change that.
@vaidehijoshi
@thedavedev
I consistently upped my salary over my career by being strategic. Research the going rate. Read books on negotiation. Obtain hard to find skills. Specialize in something. Be the best. Change companies if you feel undervalued. Don’t be afraid to walk. But money isn’t everything.
I’m about to tell you how I’m going to break into your AWS account and steal all your data! Mwahaha. Then
@kolbyallen
is going to tell you how to stop me. DVC304 Venetian 1 pm.
#reInvent
Prolonged AWS outage takes down a big chunk of the internet [TR: If your website is that important, consider multi-region failover, as I discuss in class. First thing we built out when I moved a security vehicle for to cloud.]
I’m writing a modern book ~ one blog post at a time ~
#cybersecurity
for executives. It will cover cloud security too. If you’d like to read it follow me here and please clap if you like it!
Been teaching my 8-year old son to code with
@CodeCombat
. This is *highly* recommended folks! I did this with him, went and did an hour of work and he was still loving it when I came back.
Even after breach, Capital One is 'all in' on the cloud | American Banker [Yes! Because it’s not the cloud’s fault. Capital One will be even more secure after this breach due to lessons learned. It’s one of the best places I worked due to smart coworkers.]
How network traffic got me into cybersecurity.
[Also — being paid by a large hosting company to go away after reporting a security incident, and other strange events.]
For anyone in an underrepresented group who wants to learn more about cloud, DevOps, or AWS check out this grant to attend AWS re:Invent 2019. Pretty sweet! I had to take vacation time and pay my own way the first time I went!
This is awesome. I wrote a white paper about automated detection and response on AWS in 2016 when no one I asked was doing it. Love the improvements in this space.
Good article by Netflix - these are things you need to establish when moving with large parts of your env to
#Cloud
[Article] Snaring the Bad Folks
#CyberSecurity
#CloudSecurity
A number of people asked me how to get started with CloudFormation this week at re:Invent and if they should use the CDK. Here are some tips for getting started.
#reinvent
#cloudformation
#aws
I see a lot of AWS pentest blogs relying on very poor credential configurations or making a leap to assume they will have permission to do something they won’t. Come learn about preparing for an AWS pentest at my talk at re:Inforce. Not online yet but hope soon.
Severe ‘Perfect 10.0’ Microsoft Flaw Confirmed: ‘This Is A Cloud Security Nightmare’ [TR: Well, this is big. It is every security person’s worst fear when using cloud. Note speed to fix (talked about that at RSA) and tiers - upcoming blog post on that.]
As I’m updating my class, the cloud vendors are announcing new features daily. Although I try, it’s impossible to cover every detail in 5 days. That’s why I teach not just technology, but how to think about security - to evaluate new things and design secure cloud architectures.
When we deliver a pentest report it includes not only the findings but information to replicate and fix them. I’m helping a couple of customers with that right now. Make sure your report doesn’t just tell you what the problems are but also tells you how to fix and validate.
Really not cool when people steal your book and post it online for free. Took a year to write it and only costs $9.95 for Kindle format. Thanks a lot. Please buy books and support authors. I give a lot of other content out for free on my blog.
If you were looking for the cost of MFA on Azure it's here. Although support folks just stated I need the P2 license which is $9/month and this page says the P1 license works which is $6/user per month. PS Virtual MFA is free on AWS.
Cybersecurity researchers face real-life threats [TR: I know stories about the owners of Blue Frog and
@briankrebs
in his book Spam Nation. Any other stories and sources to back them up?]
AWS VPC Flow Logs do not capture AWS DNS traffic. I was told this is because that traffic never leaves the hypervisor so presumably AWS Flow Logs are generated at Layer 2 and 3 using actual NetFlow protocol
Do you watch what your TV does on your network? Ours randomly turns on and tries to connect to things denied by firewall. Inherited it from housemate. Not a fan. Now reading the brand, Hisense, is connected to the CCP. Hmm. Monitor your tv traffic and let me know what you see.
GitHub Says Hackers Breached Dozens of Organizations Using Stolen OAuth Access Tokens. An attacker abused stolen OAuth tokens issued to two third-party OAuth integrators, Heroku and Travis-CI, to download data from dozens of organizations, including NPM.
I like the new jacket! Thanks
@awscloud
! ❤️ Been wearing it since Seattle is colder than Savannah and wasn’t really prepared for six extra days. 😆
I just realized, while applying for an Australian visa, that I never received a hard copy of my
#GSE
and a couple other certs - so I contacted SANS and I just got it - in a frame even. Nice!
#cybersecurity
GSE # 240
I created a new AWS user in a new AWS account. There are events in CloudTrail showing that user contacted Amazon Q, which I did not do. These events are in us-east-1 which is not the region in which I was working. I just changed to us-east-1 to check the CloudTrail logs from the
Got a message from a gentleman who read my book before taking a new C-level job at a startup. Now wants to give it away to customers. He has worked at large tech companies and successful startups ~ now working on a new data security product. Very cool.
Great interview with
@hackingdave
~ fellow
@IANS_Security
faculty member. Aligns with why I say executives need to care more about cybersecurity in the first chapter of my book. Also check your insurance policy for exclusion of “acts of war.”
Never allow traffic on port 4444 on your network. This is the default port used by Metasploit. It won’t stop advanced attacks but at least make the attacker go to the trouble of changing the port! If you see an active connection on that port in your network logs now, investigate.
Master Sgt. Amanda Draeger completed her GIAC Security Expert (GSE) certification, making the her one of only four women out of approximately 250 people worldwide who are GSE certified. [2018. I wonder what the stats are now.]
Top Priorities for Cloud Application Security ~ slides from my recent presentation at Countermeasure in Ottawa. I hope to be giving this talk again at future events and will be expanding on the topic.
#cloudsecurity
Lessons learned from an actual cloud breach. 1. Security awareness and MFA 2. Alert on new admin accounts 3. Monitor for scans 4. Monitor for data duplication and movement internally 4. Open ports, DLP, and excessive network traffic.
Troubleshooting Windows
#100
: "Do I own this?"
Across the org, users of a business app are told they can't get a license for their critical tool. Hanging on contacting the license server. A problem call is spun up and application owners engaged. Server is running. Call vendor.🧵
Introducing the first AWS Security Heroes | AWS News Blog
~~~
I was already an AWS Hero as some of my followers know but now I’m an
#AWS
#Security
Hero.
Yay! 🩵🩵 Thank you AWS. Still my favorite cloud platform.
@TeriRadichel
This wish has been fulfilled, Teri! 🙌🎉 Our service team has implemented a change based on your input; thanks again for the suggestion! ^RH
I found
@TroyHunt
years ago watching authentication videos on
@pluralsight
and started following on Twitter. Love some of his points of view here. Also love
@shehackspurple
calling out everything Canadian 😆