How to comply with Google and Yahoo’s requirements for bulk email senders

January 11, 2024
Sean Whalen

To help protect their customers from malicious and junk emails, Google and Yahoo have announced that they will begin to enforce additional requirements for…

How to create a single-node Graylog instance and analyze FortiGate logs

April 13, 2023

Firewall logs provide a wealth of information about a network. They can be used to identify devices, troubleshoot policies, and…

Business Email Compromise prevention and response

June 19, 2022

Business Email Compromise (BEC) attacks are easy, cheap, and often very effective. This high Return on Investment makes BEC an…

SEIMs and Other Forensic Tools Vulnerable to Log4j Exploits

December 23, 2021

This article was last updated on 2022-01-03. After several Log4j vulnerabilities (known as Log4shell or LogJam in the tech press)…

How to update the firmware on a Samsung monitor

November 25, 2021

This guide explains the exact steps for updating the firmware on Samsung monitor, and will hopefully save you a lot…

How to Install Volatility 2 and Volatility 3 on Debian, Ubuntu, or Kali Linux

October 6, 2021

Volatility is a powerful memory forensics tool. This guide will show you how to install Volatility 2 and Volatility 3…

How to use Farsight Security’s DNSDB to harness the power of passive DNS

May 22, 2021

DNS describes the structure of resources on the internet. It can provide lots of valuable information about (attacker or target)…

An introduction to DNS

May 15, 2021

The Domain Name System (DNS) is best known as the way domain names are converted into IP addresses that clients…

How to examine a credential harvesting page using Microsoft Edge

May 10, 2021

Recently I analyzed a credential harvesting page with some interesting characteristics that made a great teaching moment. In this post,…

How to configure a nginx reverse proxy with Let’s Encrypt certificates

February 26, 2021

Let's Encrypt allows nginx reverse proxy servers to have a real, trusted SSL certificate, even for internal sites.