Steve

@cybersec_steve
0 Followers
0 Following
5 Posts
5+ years in cybersecurity, dedicated to hunting threats and safeguarding systems. Connect with me at CrushingSecurity.com or follow on Twitter: @cybersec_steve1
Websitehttps://crushingsecurity.com
Newletterhttps://newsletter.crushingsecurity.com/
Twitterhttps://twitter.com/cybersec_steve1
Supporthttps://support.crushingsecurity.com/

🕵️‍♂️ New Blog! Master the art of Passive Reconnaissance with our latest guide! Dive into top techniques and tools for ethical information gathering in cybersecurity. Part 1 is live now!

🔗 https://community.crushingsecurity.com/t/mastering-passive-reconnaissance-top-20-techniques-for-ethical-information-gathering-part-1/128

#Cybersecurity #Recon #InfoSec #PassiveRecon #EthicalHacking #CrushingSecurity

Mastering Passive Reconnaissance: Top 20 techniques for Ethical Information Gathering (Part 1)

Introduction In cybersecurity, passive reconnaissance is a valuable skill. It allows professionals, attackers, and essentially anyone with an internet connection, to gather information about a ‘target’ without directly interacting with the target system. This non-intrusive method, often the first step in ethical hacking, is excellent in identifying potential vulnerabilities and strategizing subsequent actions. Drawing from my own experience as a blue teamer, I’ve frequently employed passive info...

Crushing Security

🛡️ New blog! Learn how to save your SOC from stagnation. Inspired by Carson Zimmerman's talk at SANS Blue Team Summit 2023. Key points:
1️⃣ Detection V-Teams
2️⃣ Technical Hotwash
3️⃣ Automation
4️⃣ Proactive Hunting
5️⃣ SOPs
6️⃣ Post-Incident Reviews
7️⃣ Collaboration
Read more: https://community.crushingsecurity.com/t/how-to-save-your-soc-from-stagnation-lessons-from-carson-zimmerman-s-sans-blue-team-summit-2023-keynote/127

#cybersecurity #SOC #SANS

🛡️ How to Save Your SOC from Stagnation: Lessons from Carson Zimmerman’s SANS Blue Team Summit 2023 Keynote

Introduction 🌟 Security Operations Centers (SOCs) play a crucial role in safeguarding organizations from cyber threats. However, like most things, SOCs come with their own challenges, stagnation and employee burnout being popular among them. As someone who’s been working in the SOC for over five years, I’m always on the lookout for ways to improve our operations. I recently came across a talk by Carson Zimmerman at the SANS Blue Team Summit that offered valuable insights into avoiding SOC ...

Crushing Security
Hey everyone! 🎉 We've updated our Community Resource Masterlist with more #cybersecurity resources! Dive into Free Cybersecurity Courses, explore CTFs & Challenges, and discover a range of Blue Team Tools. Plus, join as an Early Supporter for exclusive perks! Be part of our journey from the start. Dive deeper with us at CrushingSecurity. 🛡️🌐
🔗 https://community.crushingsecurity.com/t/comunity-resource-masterlist/90
📚 Comunity Resource Masterlist

📚 Community Resource Masterlist 🌐 Introduction Welcome to the community-driven resource center. 🤝 Dive in and discover insights, techniques, and guides contributed by your peers. This thread aims to serve as a comprehensive master list of resources available. 🔖 General Resources 🌐 Cybersecurity YouTube Master List 📋 Cheatsheets & Quick References 🌐 BlueTeam Tools Master List 🎤 Cybers...

Crushing Security

🔍 New blog on Microsoft’s Storm-0558 Incident! Learn about the importance of monitoring crash dumps & steps to enhance cybersecurity defenses. Key points:

1) The significance of monitoring crash dumps and other sensitive files.
2) Practical steps organizations can take to enhance their cybersecurity defenses.
3) The role of education and training in ensuring data security.

Read & share: https://community.crushingsecurity.com/t/why-we-should-keep-an-eye-on-crash-dumps-lessons-from-microsoft-s-storm-0558-incident/115

Feedback appreciated! 🌐

🔍 Why We Should Keep an Eye on Crash Dumps: Lessons from Microsoft’s Storm-0558 Incident

🔍 Why We Should Keep an Eye on Crash Dumps: Lessons from Microsoft’s Storm-0558 Incident 🌐 Microsoft’s Storm-0558 Incident 📝 Introduction Welcome to my blog. Whether you’re tech-savvy or simply curious about cybersecurity, this post is for you. We’re going to dive into a recent Microsoft incident and explore methods organizations can use to protect themselves and identify vulnerabilities that might lead to similar situations. ⚡ The Storm-0558 Incident: A Quick...

Crushing Security

🔍 Digital Footprint Control

Online, we leave traces. Watched a DEFCON talk by V3rbaal - eye-opening!

🌐 OSINT reveals our public info. 🔍 Wonder where data goes? Who profits?
👣 Know your online presence. Separate work/personal.
🛡️ Simple steps help: opt-out, check sign-ups.
💰 Data's big for businesses & bad guys.

This month, deep dive into privacy at Crushing Security. Join us & get our Privacy Checklist!

Checkout the full blog here! https://community.crushingsecurity.com/t/digital-privacy-in-the-modern-age-taking-control-of-your-footprint/110

🔐 Digital Privacy in the Modern Age: Taking Control of Your Footprint

" Empowering Your Digital Journey: Simple Steps to Privacy " Introduction: In today’s digital world, every online action, from clicks to shares, leaves a mark. As we kick off our September Digital Security Month series, I’d like to share insights from a DEFCON talk by V3rbaal. This talk emphasized the importance of understanding our digital presence and set the tone for the content we’ll be exploring this month. Watch the full talk here. The Essence of OSINT: 🌐 Open Source ...

Crushing Security