Skip to main content
Rainbow and Unicorn
  • About Me
    • Projects
    • Resume
    • PGP
  • Contact Me
  • OSINT Fans
  • Home

Author: Gabor

Gabor Szathmari is a cybersecurity expert and digital privacy enthusiast. In his professional life, Gabor helps businesses, including many small and mid-size legal practices, with their cybersecurity challenges at Iron Bastion.

Your Definitive Guide to Information Security Conferences in 2019

12th November 201816th December 2018 Gabor

Are you a hacker or an information security professional looking for conferences down under? Our non-comprehensive list features the major cyber events Australia has to offer in 2019.

Read More

Phishing Is the Top Reason Behind Australian Data Breaches

7th November 201816th December 2018 Gabor

The latest Notifiable Data Breaches Quarterly Statistics Report confirms that Australian legal practices are at risk of cybercrime with phishing as the main threat.

Read More

Setting Up an Email Server for the Direct Email Spooling Attack (How-to Guide)

10th October 201816th December 2018 Gabor

This how-to guide aims to demonstrate how easy it is to circumvent expensive email security solutions with simple open-source tools. Email administrators can also follow this guide to build their email delivery service for email direct spool attack security assessments.

Read More

Discovering Hidden Email Gateways with OSINT Techniques

10th October 201816th December 2018 Gabor

In this article, we elaborate how we managed to identify hidden internal email servers by relying on various open-source intelligence (OSINT) data sources for our direct email spool attack research.

Read More

How to Evade Expensive Phishing Filters with One Simple Trick

10th October 201816th December 2018 Gabor

One in three Australian law firms are susceptible to a cyber threat called “direct email spool attack”, our report can reveal. This attack technique bypasses expensive email security solutions, rendering them completely useless and exposing the affected organisations to cybercrime.

Read More

Five Ways to Identify Phishing Emails

4th October 201816th December 2018 Gabor

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. This is my up-to-date guide helping you recognise the latest email-based scams.

Read More

Posts pagination

Newer posts 1 … 3 4 5 … 14 Older posts

Ramblings

  • Coding (7)
  • Comment (1)
  • Forensics (2)
  • Incident Response (7)
  • Privacy (5)
  • Security (59)
  • Technology (11)

Posts

  • December 2022 (1)
  • July 2022 (1)
  • June 2022 (1)
  • May 2022 (1)
  • April 2022 (1)
  • March 2022 (2)
  • February 2022 (1)
  • January 2022 (1)
  • May 2021 (1)
  • September 2019 (1)
  • August 2019 (1)
  • June 2019 (1)
  • April 2019 (2)
  • February 2019 (1)
  • January 2019 (1)
  • November 2018 (3)
  • October 2018 (4)
  • September 2018 (2)
  • August 2018 (5)
  • July 2018 (4)
  • June 2018 (6)
  • January 2018 (1)
  • December 2017 (2)
  • October 2017 (1)
  • November 2016 (1)
  • October 2016 (2)
  • September 2016 (1)
  • July 2016 (1)
  • June 2016 (3)
  • May 2016 (2)
  • March 2016 (3)
  • February 2016 (1)
  • January 2016 (1)
  • December 2015 (1)
  • November 2015 (5)
  • October 2015 (1)
  • September 2015 (1)
  • August 2015 (2)
  • July 2015 (2)
  • June 2015 (1)
  • May 2015 (1)
  • April 2015 (1)
  • March 2015 (1)
  • February 2015 (1)
  • January 2015 (1)
  • December 2014 (2)

Tags

api breach conveyancing cryptoparty csirt csu cybersecurity database demisto DFIR direct email spool attack dns email encryption governance hackedteam hardening javascript journalism legal malware Managed Services meetup metasploit noscript oracle owasp patching phishing php policies privilege escalation python raspberry pi secops slides Small Business sri tech support scams twitter two-factor web apps whistleblowing wordpress xss

Related Sites

  • OSINT Fans
  • Iron Bastion Security Blog
  • Iron Bastion Cyber Security Consulting
  • Arrow Networks Managed IT Services

Recent

  • Are Technical Support Scams Getting More Advanced?
  • Five Eyes Cyber Security Predictions
  • Removing Secrets From Your Source Code
  • Ukraine Power Grid Cyberattacks
  • Cyberwar and Cyberterrorism: What is the Difference?

Categories

  • Security
  • Technology
  • Coding
  • Incident Response
  • Privacy
  • Forensics
Gabor's Security Blog All rights reserved
Theme by Colorlib Powered by WordPress