And yet injection is still #3 in the OWASP Top 10
And yet injection is still #3 in the OWASP Top 10
This article is AI generated SEO spam.
I set up Netbox recently at work to try and improve the abysmal documentation situation. I use an Ansible playbook to provision and set up the server, then copy a docker compose file and start the containers. So far I’m loving Netbox, I just wish my predecessors had documented things from the start.
Namecheap + the dynamic DNS client in pfSense. No issues sinve I set it up years ago.
Before that it was a cron job that updated through the google domains api.
Da Archive maybe? Most of my stuff has come from there.
I recently set up and started using MediaTracker for this purpose. It’s kind of barebones, but functional. Seems like its biggest difference with movary is that it also covers TV, ebooks, audiobooks, and games.
I have a little section for movies and books on my website and i’ve been working on a script to automatically pull those lists and reviews from MediaTrackers api each time I build my site.
Stay suspicious. As a security guy, i’d way rather respond to 1,000 false positive reports than have an employee that doesn’t think about it and just clicks.
It is a great step but it’s rare to have enough buy in from upper managent to enforce any real consequences for repeat offenders. I’ve seen good initial results from this kind of phishing testing, but the repeat offenders never seem to change their habits and your click rate quickly plateaus.
Oh thanks, saved. Will break this image out next time it happens, though I usually end up dying from getting into desperate situations looking for antifungals before it gets to this point.
Thanks! This is actually exactly what I have been basing my efforts on so far, it’s just sobering to look at how far away we are from completing implementation group 1.
I just started my first official cybersecurity position at a medium size company in an industry that is currently being heavily targeted with ransomware.
I’m starting pretty much from scratch as they have not had a dedicated security role in over a year and my predecessor didn’t make much progress. So far i’ve been focused on inventory lists, policies, and procedures for hardware, software, and data. I think we’re doing okay with minimizing stuff thats internet facing and patching is in a good place (well, at least with the devices and os’s that are still supported).
Any suggestions on where to go from there or what to prioritize?
I’m studying for CCSP right now. It’s fairly general and tries to be vendor neutral but Architecture is one of the knowledge domains on the exam. Might be worth it if you meet the work requirements or experience waiver requirements.
A lot of people also seem to conflate it with the CISSP when it comes up in conversation I’ve noticed.
Curation is my answer. Return to the old ways of curating your own lists of resources and sharing them with other people. Web rings, blog rolls, link sharing, RSS
Got the email from hibp and was sad to find that domain search is no longer free :(
I swear by ddrescue. It’s a situation I strive to never be but i’ve been there before. I used it once to rescue an employees masters capstone project from their dead work laptop.
As someone in the thick of it, it has been a nervewracking quarter for mortgage company IT and Infosec teams. There have been several very high profile breaches the last few months.
Oh MediaTracker looks nice, thanks!
I now want a roleplaying game set in village like this.
.1Q because Q has a tag on it
You make it sound as if it’s a thing of the past when it is still a common problem.