Sheep in Wolves’ Clothing : How our IP based authentication rules need to changeThis is a quick post on some thoughts on this problem and some ideas of how we may need to change. It is biased a bit towards Azure but…Oct 4, 2023Oct 4, 2023
Adversary In the Middle — Part 1: WalkthroughAdversary in the Middle is growing as a Phishing threat, with its ability to steal MFA tokens it is fast becoming the only method to Phish.Sep 20, 2023Sep 20, 2023
Adversary In the Middle — Part 2 DetectionAdversary in the Middle is growing as a Phishing threat, with its ability to steal MFA tokens it is fast becoming the only method to Phish…Sep 19, 2023Sep 19, 2023
Collaboration in InfosecFirst draft — would love comments, feedback and suggested reading!Feb 8, 2022Feb 8, 2022
Know your perimeter/attack surfaceNote — This was originally posted on my site infosecamateur.com in July 2020. Follow me on Twitter @mconnarty!Jan 25, 2022Jan 25, 2022
The SOC FormulaNote — This was originally posted on my site infosecamateur.com in September 2020. Follow me on Twitter @mconnarty!Jan 25, 2022Jan 25, 2022
Threat Intelligence lead content creationThe below was originally posted on my site — infosecamateur.com in July 2021Jan 25, 2022Jan 25, 2022
The VilNE ProjectNote: This originally appeared on my site — infosecamateur.com on Jan 18 2022Jan 25, 2022Jan 25, 2022