Utilizing VOIP for Fraud

My phone rings from an unfamiliar number and per the usual, the caller ID identifies it as spam. Expecting another cold call from a foreign “business service,” I pick up anyway.Part curiosity, part boredom. Yet surprisingly, I’m greeted with: “Hi Dear, we are calling from Affirm. We’ve detected an unusual login attempt from your account … Read more

Leadership Philosophy in Cyber Security

Beginning my MBA studies, I’ve been asked or rather encouraged to lay out and devise a ‘Leadership Philosophy’. To explain briefly, a leadership philosophy is essentially the foundation and pillars that serve as your guide in your decision making processes. It is intended to be your principles, how you manage your relationships, and how you … Read more

URL Analysis w/ URLScan – Indication of Compromise

As I’m currently attending a conference I’ve been enjoying the variety of talks and presentations. But one problem I tend to encounter frequently is the practical application of certain actions described in these talks is lacking. Many talks at conferences explain the ‘why’ behind threats, but rarely the ‘how’ behind the analysis. Thus, in an … Read more

A Glimpse at SEO Poisoning

During a recent investigation, I had the chance to dig into a case of SEO Poisoning. It’s a tactic that doesn’t get nearly enough attention, so I wanted to share what I found—especially how attackers choose domains and use SEO tricks to pull off these types of attacks. What is SEO? Search Engine Optimization (SEO) … Read more