Recent posts

Anatomy Lesson of a UPS Phishing Email

  2 minute read  

There is bound to be a number of phishing emails you will get that will be easy to spot. Fortunatly there is still a fair amount of large phishing campaigns that take more of the spray and pray approach than one of researching and targeting a specific organization or person. The ones that can really get you are the simple ones, with just a little text, a photo of a trusted brand and a link and ...

Quick And Easy Ways to Protect Your Company From CEO Fraud

  5 minute read  

In this blog post iโ€™m going to share one quick and easy technique you can use to protect your company from 2 different types of CEO fraud. The technique I detail in this blog post is not the only way to detect these emails. Itโ€™s just one of many ways. Also. please know that nothing in this blog post is new or ground breaking. I donโ€™t propose any new fancy techniques. There are times in security...

Using Powershell and Microsoft EWS Managed API to download attachments in Exchange 2016

  7 minute read  

Have you ever used a piece of software that provides no way of saving attachments or reports directly to a file? Yeah, me too. Itโ€™s frustrating. Iโ€™m very passionate about automating repetitive tasks and the frustration Iโ€™ve had over this particular issue has caused me to look into a solution. What I found was that I can use my beloved Powershell, in combination with Microsoft Exchange Web Servi...

Themes and Thoughts from the 2018 NYS Cybersecurity Conference

  5 minute read  

I had the opportunity to attend the 2018 NYS Cybersecurity Conference held in Albany NY. The conference is held every year in June and this year marked 21 years of the conference. Iโ€™ve attended this conference twice now, the first time last year (2017), and I always get a lot of value from this trip. This time I had the chance to also take a full day of training on the topic of DevSecOps (which...