Profile avatar
dkeefe.bsky.social
CompTIA Security+ | LPI Linux Essentials | Former Law Enforcement | OSINT Enthusiast | Christ Follower https://www.linkedin.com/in/dkeefe/
51 posts 2,552 followers 566 following
Prolific Poster

DNS Dumpster is a free OSINT tool for passive DNS reconnaissance, widely used in cybersecurity for network footprinting and attack surface mapping. dnsdumpster.com

If you're planning to launch a new website to start the year strong, my wife would be thrilled to work with you! Check out her business at [Close to the Coast Creative](closetothecoastcreative.com/).

Wishing you all a very Merry Christmas!

Demystifying ๐—ฆ๐—ถ๐˜… ๐—ฆ๐—ถ๐—ด๐—บ๐—ฎ in Cybersecurity: Precision in Threat Reduction Six Sigma isn't just a manufacturing methodologyโ€”it's a powerful approach to minimizing security vulnerabilities and operational risks. Here's how cybersecurity professionals leverage this strategic framework: Key Principles: โ€ข

Snowflake Systems: A Cybersecurity Minefield In the world of enterprise IT, "Snowflake Systems" represent a unique cybersecurity challenge. These are highly customized, one-of-a-kind IT infrastructures that evolve organically within organizations. Key Risks: โ€ข Extreme customization makes consisten

Understanding ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ-๐—ข๐—ฟ๐—ถ๐—ฒ๐—ป๐˜๐—ฒ๐—ฑ ๐—”๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ (SOA) in cybersecurity: - SOA is a design approach where services (self-contained units of functionality) are provided to other components via a network. - These services are loosely coupled, meaning they function independently and can be reused across d

An ๐—ผ๐—ป-๐—ฝ๐—ฎ๐˜๐—ต ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ is a type of cybersecurity threat where an attacker intercepts and potentially alters communication between two parties by positioning themselves between the sender and receiver of network traffic. The attacker can eavesdrop on data transmission, steal sensitive information, or man

๐—•๐—ถ๐—ผ๐—บ๐—ฒ๐˜๐—ฟ๐—ถ๐—ฐ ๐—ถ๐—บ๐—ฝ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป involves spoofing or mimicking biometric traits, such as fingerprints, facial features, or voice patterns, to bypass authentication systems. While biometrics enhance security through unique identifiers, practitioners must address vulnerabilities like deepfake technology, repl

A ๐—ง๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—™๐—ผ๐˜‚๐—ป๐—ฑ๐—ฟ๐˜† is a secure, vetted manufacturing facility for producing sensitive hardware components, ensuring the integrity and authenticity of chips and devices used in critical systems. It is a cornerstone of supply chain security, reducing the risk of tampering, counterfeits, and backdoors.

๐—”๐˜๐—ผ๐—บ๐—ถ๐—ฐ ๐—ฒ๐˜…๐—ฒ๐—ฐ๐˜‚๐˜๐—ถ๐—ผ๐—ป refers to the process of ensuring that a series of operations in a system are completed entirely or not at all, preventing partial execution. This is critical in maintaining data consistency and system reliability. Security concerns include vulnerabilities to race conditions, rollba

A 2023 survey found that two-thirds of Gen Z respondents reported being targeted for online โ€œsextortionโ€, with 71% of those who cited catfishing as the โ€œhookโ€ into sextortion saying they were asked primarily to share intimate imagery or personal information. #cybersecurity #childsafety #awareness

A ๐—ฃ๐—ต๐˜†๐˜€๐—ถ๐—ฐ๐—ฎ๐—น ๐—จ๐—ป๐—ฐ๐—น๐—ผ๐—ป๐—ฎ๐—ฏ๐—น๐—ฒ ๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป (๐—ฃ๐—จ๐—™) is a hardware-based security feature that leverages the inherent physical variations in a device's manufacturing process to generate unique, unclonable identifiers or cryptographic keys. While PUFs enhance security by being resistant to tampering and replication,

๐—ฉ๐—  ๐—ฆ๐—ฝ๐—ฟ๐—ฎ๐˜„๐—น: The Silent Efficiency Killer in Cloud Infrastructure Virtual Machine (VM) sprawl occurs when an organization creates more virtual machines than it can effectively manage, leading to: -Increased operational costs -Reduced system performance -Unnecessary resource consumption -Complex infra

๐—™๐—ผ๐—ผ๐˜๐—ฝ๐—ฟ๐—ถ๐—ป๐˜๐—ถ๐—ป๐—ด and ๐—ณ๐—ถ๐—ป๐—ด๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐—ป๐˜๐—ถ๐—ป๐—ด are reconnaissance techniques in cybersecurity, but they differ in scope and purpose. Footprinting involves gathering general information about a target system, organization, or network. This can include details like IP ranges, domain names, and public-facing assets,

I hope that you and your family have an opportunity to make some great memories today. Step away from your keyboards and spend time with those who matter most. Happy Thanksgiving!

๐—ก๐—ฒ๐˜€๐˜€๐˜‚๐˜€ ๐—˜๐˜€๐˜€๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ offers cybersecurity enthusiasts and IT professionals an accessible entry point into vulnerability scanning. This free version of the Nessus Vulnerability Scanner enables users to quickly set up network scans, providing invaluable hands-on experience in identifying potential securi

๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐—ด๐—ฟ๐—ฎ๐—ฝ๐—ต๐—ถ๐—ฐ ๐—˜๐—ฟ๐—ฎ๐˜€๐—ฒ (CE) is a data sanitization method that removes data by deleting the encryption key that was used to encrypt the data, rendering the encrypted data unrecoverable. Key security concerns include proper key destruction, verification of the original encryption implementation, and ens

A zero-fill erase is a data sanitization technique that systematically overwrites all storage sectors of a digital device with binary zeros (0s), attempting to eliminate previously stored information by replacing existing data with a uniform zero state. While simple to execute, this method is consid

Have you filed your Beneficial Ownership Information (BOI)? Be cautiousโ€”some individuals are sending out notices and charging fees of $500 or more to file on your behalf. While the BOI filing requirement is legitimate, these fees are not mandated by the Federal Government. Consider sharing this info

๐—ฅ๐—ฒ๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ฃ๐—ผ๐—ถ๐—ป๐˜ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ (๐—ฅ๐—ฃ๐—ข) is the maximum acceptable duration of data loss during a system failure or disaster, representing the point in time to which data must be recovered after an incident. #cybersecurity #cyber #CySA #teamSC

The Mayflower Compact - as it is known today - was signed by those 41 โ€œtrueโ€ Pilgrims on 11 November, 1620, and became the first governing document of Plymouth Colony. Of the 41 men who signed, three were related to me. John Howland (9th great-grandfather) John Tilley (10th great-grandfather) Edwar

๐—ฅ๐—ฒ๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ง๐—ถ๐—บ๐—ฒ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ (๐—ฅ๐—ง๐—ข): The maximum acceptable amount of time a system, application, or process can be down after a disruption before normal operations must be restored to avoid significant impact. #cybersecurity #CySA #levelup #teamSC

๐—ฃ๐—ผ๐—ฟ๐˜ ๐Ÿญ๐Ÿญ๐Ÿฌ is used by the ๐—ฃ๐—ผ๐˜€๐˜ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ผ๐—ฐ๐—ผ๐—น ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ป ๐Ÿฏ (๐—ฃ๐—ข๐—ฃ๐Ÿฏ) to retrieve emails from a mail server. Security concerns include unencrypted communication, making it vulnerable to interception; susceptibility to man-in-the-middle attacks; brute force attacks due to weak passwords; and the lack of mode

๐—ฃ๐—ผ๐—ฟ๐˜ ๐Ÿฑ๐Ÿฏ is used by ๐——๐—ก๐—ฆ (๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—ก๐—ฎ๐—บ๐—ฒ ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ) for resolving domain names into IP addresses. - ๐—จ๐——๐—ฃ: Handles regular DNS queries for speed. - ๐—ง๐—–๐—ฃ: Used for large data transfers, like DNS zone transfers. ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ถ๐˜€๐—ธ๐˜€: - Spoofing/Poisoning: Redirecting traffic to malicious sites. - Amplifica

Five people have been arrested in the US and are alleged to be members of the Scattered Spider criminal gang. This gang is suspected of being behind the MGM attack. #cybercrime #cybersecurity news.sky.com/story/scotti...

Looking for Incident Response Playbooks? Check out this website to get some free templates as a starting point. ---> www.incidentresponse.com/ #cybersecurity #teamSC #levelup

๐—ฉ๐—ผ๐—น๐˜‚๐—บ๐—ฒ-๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฎ๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€ in cybersecurity refers to examining large amounts of data, such as logs or network traffic, to identify patterns, anomalies, or trends that could indicate potential security threats, such as DDoS attacks or unauthorized access attempts. It focuses on the quantity of activity r

In cybersecurity, ๐—™๐—ฟ๐—ฒ๐—พ๐˜‚๐—ฒ๐—ป๐—ฐ๐˜†-๐—•๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€ is the process of examining how often specific events, patterns, or values occur in datasets, such as logs or network traffic. It helps identify anomalies, trends, or potential threats by detecting deviations from normal behavior, such as repeated login att

A ๐—ฝ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ ๐—ฝ๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ is a tool or technique used to compress or encrypt executable files, often to reduce their size or obfuscate their contents. In the context of the CySA+ exam, packers are significant because threat actors often use them to evade detection by antivirus software or other security tool

10 days until our annual black Friday sale kicks in! Don't miss our biggest sale of the year... 25% any of our #OSINT courses or bundles. We'll announce the code on our socials! Don't want to miss it? Sign up for our FREE newsletter here: myosint.link/newsletter @webbreacher.com @hatless1der.com

Looking to hone your RegeEx skills? Check out this great website to help you better understand RegEx which is important when digging through logs. ---> regexr.com/ #cybersecurity #regex #teamSC #SkillBuilding

Looking for a FREE "Message Header Analyzer"? This is great tool for inspecting email headers. ---> mha.azurewebsites.net/ #cybersecurity #cyber #skillbuilding

๐—”๐—น๐˜„๐—ฎ๐˜†๐˜€ ๐—ฎ๐—น๐—น๐—ผ๐˜„ ๐—ผ๐˜‚๐—ฟ ๐˜๐—ฒ๐—ฎ๐—บ ๐˜๐—ผ ๐˜‚๐˜๐—ถ๐—น๐—ถ๐˜‡๐—ฒ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐˜€๐˜๐—ฟ๐—ฒ๐—ป๐—ด๐˜๐—ต๐˜€. Many people see delegation as a weakness, but a true leader will cultivate the strengths of their team and delegate tasks that allow them to grow.

๐—ฆ๐˜๐—ฒ๐—ด๐—ฎ๐—ป๐—ผ๐—ด๐—ฟ๐—ฎ๐—ฝ๐—ต๐˜† The practice of hiding messages or data within other non-secret data, such as embedding a hidden message inside an image. #cybersecurity #cyber

I have taken some time off lately, and utterly enjoyed it! But it was about time I did some writing again... No Week in #OSINT yet, but something else. Because I wanted to share my thoughts on what I call "black box OSINT" tools ๐Ÿ‘‡ sector035.nl/articles/bla...

Below a talk I gave recently about Vicarious trauma and #OSINT For all you OSINT folks out there please take care of your mental health. Vicarious trauma is real! Sharing = caring youtu.be/wWehNV6sd4Y

You need to add this training platform to your resource list! There are some really great courses here and more on the way! I am looking forward to the "Level Up OSINT" course from Mishaal Khan --->www.justhacking.com/ #cybersecurity #OSINT #CTF #upskill

With Archive.org being down, here is alternative website to try. archive.ph/ #OSINT

๐—ฆ๐—ผ๐—ฐ๐—ธ ๐—›๐˜‚๐—ป๐˜๐—ฒ๐—ฟ๐˜€ In the context of OSINT (Open Source Intelligence), "sock hunters" refers to individuals or groups who actively seek out and investigate "sock puppets." A **sock puppet** is a fake online identity used by someone to deceive others, often in the context of misinformation, manipulation,

๐——๐—ฒ๐—ฒ๐—ฝ ๐—ช๐—ฒ๐—ฏ: The part of the internet not indexed by search engines, including private databases, email accounts, and password-protected sites. It's legal and makes up most of the web. ๐——๐—ฎ๐—ฟ๐—ธ ๐—ช๐—ฒ๐—ฏ: A small portion of the deep web, accessible through special tools like Tor. It's used for anonymous activit

๐—œ๐—บ๐—บ๐˜‚๐˜๐—ฎ๐—ฏ๐—น๐—ฒ ๐—•๐—ฎ๐—ฐ๐—ธ๐˜‚๐—ฝ๐˜€ Immutable backups are backup copies of data that cannot be modified, deleted, or altered in any way once they are created. This ensures that the data remains tamper-proof, providing a secure safeguard against threats like ransomware or accidental deletion. These backups are typica

Looking to add another resource to your OSINT toolbox? Griffin Glynn wrote a great post on using the social media platform "Threads". Learn how it can help you when Instagram can't. ---> hatless1der.com/threads-net-... #OSINT #SOCMINT #PIVOT

A ๐—ฝ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฒ๐˜…๐—ฝ๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ ๐—ฎ๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜ in OSINT involves identifying and analyzing publicly available information that could pose security or privacy risks. It includes: 1. ๐——๐—ฎ๐˜๐—ฎ ๐—–๐—ผ๐—น๐—น๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป: Gathering accessible information from sources like social media, public records, and websites. 2. ๐—ฅ๐—ถ๐˜€๐—ธ ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป:

Looking to start a podcast or YouTube channel? Jax Scott shares some great resources in this "Beginner Guide to Video Podcasting" ---> youtu.be/vKeVxS7JCcQ?... #cyber #podcasting #contentcreation

Looking for another great resource to add to your OSINT investigations toolbox? This website provides hundreds of search tools based on specific tags. It's a great resource that will open up even more search sites and tools for your investigations. ---> lambda.black/osint.html #OSINT #SOCMINT

The "Voices for Freedom" podcast from OUR Rescue is a great resource! Although the content is tough to hear at times, I have learned a lot. Join the fight! Check it out at ourrescue.org/education/po... #antitrafficking #OURrescue

Satellite Image & #OSINT (Hunting from Space - #GEOINT โ€” 2) The article is about why satellite images are needed in OSINT and what services can be used to work with them. snoop-ghost.medium.com/satellite-im...