ARN – Amazon Resource Name

An Amazon Resource Name (ARN) is a unique identifier used in Amazon Web Services (AWS) to specify resources across the AWS ecosystem. ARNs are essential for managing permissions and access control, as they allow users to precisely define which resources they are referring to in their policies and API calls. The structure of an ARN Read More …

IPX – Internetwork Packet Exchange

Internetwork Packet Exchange (IPX) is a networking protocol that was primarily used in the 1980s and 1990s, particularly in networks that utilized Novell NetWare operating systems. While it has largely been replaced by the more widely adopted Internet Protocol (IP), understanding IPX is important for new IT students, especially when studying the history of networking Read More …

Conference Video – Internet-Scale File Analysis

Malicious file analysis is well beyond the days when the humble PE32 file was all researchers needed to contend with. The use of malicious PDF, Office, and other files present a far more diverse threat than our defensive tools were originally designed to handle. To make matters worse, the sheer volume of files over time Read More …

What are LISP worlds?

Lisp (programming language) is a family of programming languages that originated in the 1950s, known for its unique syntax and strong support for symbolic computation and artificial intelligence, with dialects like Common Lisp and Scheme still used today. [1, 2, 3] Here’s a more detailed look at Lisp: Key Features and Concepts: [1, 4] Symbolic Computation: Lisp excels at manipulating symbols Read More …

Understanding Cisco Platform Exchange Grid

Cisco Platform Exchange Grid (pxGrid) is an innovative framework designed to enhance collaboration among security products by enabling them to share data seamlessly. Built on a Publish-Subscribe model, pxGrid allows data providers to publish information to specific topics, while consumers can subscribe to those topics to receive relevant updates. This architecture fosters a more integrated Read More …

Hacker TV – How I Would Learn Cyber Security If I Could Start Over

How I Would Learn Cyber Security If I Could Start Over Want to learn all about cyber-security and become an ethical hacker? His thoughts on the basics and fundamentals is so right on.  Networking, User or Desktop support, Server maintenance, whatever.  I firmly believe that the best security people started in IT originally.  Experience on Read More …

LazyOwn: CRIMEN

For offensive security experts, LazyOwn: CRIMEN is an advanced, Python-based framework meticulously designed to streamline and automate complex penetration testing and vulnerability analysis tasks, particularly for red team operations. Far more than a simple collection of scripts, LazyOwn aims to be a comprehensive toolkit, integrating a vast array of functionalities to mimic sophisticated cyber adversaries. Read More …

Security is underwater

Also , there are no life preservers. In a recent reflection on conversations I’ve had, I’ve noticed a recurring theme that highlights the disconnect between non-IT professionals and security experts regarding data handling and application deployment. Non-IT individuals often enthusiastically present their newly developed applications that utilize specific data and share it with various users, Read More …