Information Security

Posts related to information security, including news, tutorials, malware analysis, and threat intelligence.

How to use Farsight Security’s DNSDB to harness the power of passive DNS

DNS describes the structure of resources on the internet. It can provide lots of valuable information about (attacker or target)…

May 22, 2021

An introduction to DNS

The Domain Name System (DNS) is best known as the way domain names are converted into IP addresses that clients…

May 15, 2021

How to examine a credential harvesting page using Microsoft Edge

Recently I analyzed a credential harvesting page with some interesting characteristics that made a great teaching moment. In this post,…

May 10, 2021

How the Parler data was legally acquired by activists

The Parler data dumps you've heard were obtained legally. Here's how they did it.

January 13, 2021

How to forward a forensic copy of an email as an attachment

If you receive a fraudulent email, can be very useful to send a full forensic copy to an organization that…

August 28, 2019

How to view email headers

Email headers contain very useful information for tracing a message's origin and troubleshooting its delivery. Email headers are written with…

August 27, 2019

Proofpoint is forcing their customers to pay for Email Fraud Defense to get aggregate DMARC data from their own gateways

I have written extensively about the DMARC email security standard, including publishing a comprehensive guide on how to implement it,…

June 4, 2019

Emotet malspam campaign exploits reliance on magic for file type detection

Emotet is a Trojan designed to steal banking information. It is frequently spread by sending phishing emails to governments, banks,…

January 26, 2019

How to inspect the certificate of a mail server over a CLI

If you ever need to inspect the certificate of a remote SMTP server, you can use the openssl CLI tool.…

November 29, 2018

Demystifying DMARC: A guide to preventing email spoofing

DMARC can stop spoofed spam and phishing from reaching you and your customers, protecting your information security and your brand.…

June 15, 2018