If you’re in the northeast Ohio area, join women in cybersecurity for our 2nd annual hike!
Let us know if you're joining us - sign up here: https://mailchi.mp/929571e81a9f/julyhike
Where and When to Meet:
🔹 Date: Sunday, July 13th 2025 (rain date: Saturday, July 26th, 2025)
🔹 Location: Brecksville Reservation
🔹 Meeting Spot: Chippewa Creek Gorge Scenic Overlook - 8263 Chippewa Rd, Brecksville, OH 44141. Park here and we'll start our hike from this spot
🔹 Cost of Hike: Free!
Bring water and comfy shoes!
Hike Details:
🔹 All participants will enjoy a trail suitable for all hiking levels (Wildflower Trail) and a break at the Harriet Keeler Picnic Area and Nature Center, offering water and restrooms.
🔹 If you’re a more advanced hiker, the Gorge Loop will be an optional, more challenging section of the hike that can be muddy and requires hiking shoes. Those who prefer to skip this can remain on the all-purpose trail.
Brunch After the Hike:
🔹 Join your fellow hikers for an optional brunch and additional networking at the Creekside Restaurant, which offers lovely views and delicious food. Brunch is at your own expense.
I had the opportunity to sit down with former DTer, Joe Slowik at #RSAC to talk about suspicious domains.
Here are some of the key takeaways from our conversation:
🔹 Joe shared how attackers are playing the long game—like in the SolarWinds attack, where a fake AWS domain sat dormant for nearly a decade.
🔹 From aged domains to hijacked home routers, adversaries are evolving. And groups like Volt Typhoon are targeting U.S. critical infrastructure with chilling precision.
🔹 It’s time to rethink defense—beyond tools, toward resilient architecture and even manual fallbacks.
Listen to the podcast here: https://podcasts.apple.com/us/podcast/breaking-badness/id1456143419?i=1000711183082
Scrolling through Pinterest one day led me down a rabbit hole of suspicious looking domains stemming from sponsored ads on the platform mimicking the L.L.Bean brand.
This analysis walks through DomainTools various domain and DNS solutions to illustrate what was found, connections between domains, and how we ascribe with high confidence attribution to nexus China.
Also, do you like free things? No way, me too! You can find the full analysis here along with a free 15-day product trial: https://www.domaintools.com/resources/blog/domain-and-dns-intelligence-in-fighting-online-threats/
As online platforms evolve, cybercriminals are finding new ways to exploit them for scams and phishing attacks. Our latest research highlights how malicious actors use platforms like Pinterest to deceive users and harvest sensitive information.
Controlling what I can control at the moment. I like using tools to feel powerful and artistic at the same time.
I was going to make these as gifts and really hoping people like them and don’t think they’re junk.