PolarDNS: Open-source DNS server tailored for security evaluations

PolarDNS is a specialized authoritative DNS server that allows the operator to produce custom DNS responses suitable for DNS protocol testing purposes. What can you do with PolarDNS? PolarDNS can be used for testing of: DNS resolvers (server-side) DNS … Continue reading PolarDNS: Open-source DNS server tailored for security evaluations

How To Address Email Deliverability Problems When From Header Doesn’t Match From Envelope?

So I’m using Active Campaign as a CRM and have configured DKIM, SPF, and a DMARC none policy. I am having one particular customer of mine that’s not able to receive my emails despite them whitelisting me. They are using mimecast. I’ve don… Continue reading How To Address Email Deliverability Problems When From Header Doesn’t Match From Envelope?

The 3 key stages of ransomware attacks and useful indicators of compromise

For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we will dive into those key stages… Continue reading The 3 key stages of ransomware attacks and useful indicators of compromise

Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks

It’s always DNS. That’s what the famous internet meme popular among sysadmins says anyway. It’s funny because while clearly, every network issue doesn’t resolve to some funky DNS issue, too many network admins have banged their heads against their keyb… Continue reading Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks

DIY attack surface management: Simple, cost-effective and actionable perimeter insights

Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being decommissioned, and ongoing migrations to cloud providers. Assets can be created and for… Continue reading DIY attack surface management: Simple, cost-effective and actionable perimeter insights