Dennis Keefe's Avatar

Dennis Keefe

@dkeefe.bsky.social

CompTIA Security+ | LPI Linux Essentials | Former Law Enforcement | OSINT Enthusiast | Christ Follower https://www.linkedin.com/in/dkeefe/

2,508 Followers  |  566 Following  |  51 Posts  |  Joined: 02.02.2024  |  1.642

Latest posts by dkeefe.bsky.social on Bluesky

DNS Dumpster is a free OSINT tool for passive DNS reconnaissance, widely used in cybersecurity for network footprinting and attack surface mapping.

dnsdumpster.com

11.03.2025 02:56 โ€” ๐Ÿ‘ 5    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

If you're planning to launch a new website to start the year strong, my wife would be thrilled to work with you! Check out her business at [Close to the Coast Creative](closetothecoastcreative.com/).

10.01.2025 16:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 25.12.2024 15:00 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Wishing you all a very Merry Christmas!

24.12.2024 15:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Demystifying ๐—ฆ๐—ถ๐˜… ๐—ฆ๐—ถ๐—ด๐—บ๐—ฎ in Cybersecurity: Precision in Threat Reduction

Six Sigma isn't just a manufacturing methodologyโ€”it's a powerful approach to minimizing security vulnerabilities and operational risks. Here's how cybersecurity professionals leverage this strategic framework:

Key Principles:
โ€ข

12.12.2024 14:01 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Looks good Gerry!

12.12.2024 13:11 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Snowflake Systems: A Cybersecurity Minefield

In the world of enterprise IT, "Snowflake Systems" represent a unique cybersecurity challenge. These are highly customized, one-of-a-kind IT infrastructures that evolve organically within organizations.

Key Risks:
โ€ข Extreme customization makes consisten

11.12.2024 14:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Understanding ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ-๐—ข๐—ฟ๐—ถ๐—ฒ๐—ป๐˜๐—ฒ๐—ฑ ๐—”๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ (SOA) in cybersecurity:

- SOA is a design approach where services (self-contained units of functionality) are provided to other components via a network.

- These services are loosely coupled, meaning they function independently and can be reused across d

10.12.2024 14:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

An ๐—ผ๐—ป-๐—ฝ๐—ฎ๐˜๐—ต ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ is a type of cybersecurity threat where an attacker intercepts and potentially alters communication between two parties by positioning themselves between the sender and receiver of network traffic. The attacker can eavesdrop on data transmission, steal sensitive information, or man

09.12.2024 14:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—•๐—ถ๐—ผ๐—บ๐—ฒ๐˜๐—ฟ๐—ถ๐—ฐ ๐—ถ๐—บ๐—ฝ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป involves spoofing or mimicking biometric traits, such as fingerprints, facial features, or voice patterns, to bypass authentication systems. While biometrics enhance security through unique identifiers, practitioners must address vulnerabilities like deepfake technology, repl

06.12.2024 14:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

A ๐—ง๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—™๐—ผ๐˜‚๐—ป๐—ฑ๐—ฟ๐˜† is a secure, vetted manufacturing facility for producing sensitive hardware components, ensuring the integrity and authenticity of chips and devices used in critical systems. It is a cornerstone of supply chain security, reducing the risk of tampering, counterfeits, and backdoors.

05.12.2024 14:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—”๐˜๐—ผ๐—บ๐—ถ๐—ฐ ๐—ฒ๐˜…๐—ฒ๐—ฐ๐˜‚๐˜๐—ถ๐—ผ๐—ป refers to the process of ensuring that a series of operations in a system are completed entirely or not at all, preventing partial execution. This is critical in maintaining data consistency and system reliability. Security concerns include vulnerabilities to race conditions, rollba

04.12.2024 14:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

A 2023 survey found that two-thirds of Gen Z respondents reported being targeted for online โ€œsextortionโ€, with 71% of those who cited catfishing as the โ€œhookโ€ into sextortion saying they were asked primarily to share intimate imagery or personal information.

#cybersecurity #childsafety #awareness

03.12.2024 18:00 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

A ๐—ฃ๐—ต๐˜†๐˜€๐—ถ๐—ฐ๐—ฎ๐—น ๐—จ๐—ป๐—ฐ๐—น๐—ผ๐—ป๐—ฎ๐—ฏ๐—น๐—ฒ ๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป (๐—ฃ๐—จ๐—™) is a hardware-based security feature that leverages the inherent physical variations in a device's manufacturing process to generate unique, unclonable identifiers or cryptographic keys. While PUFs enhance security by being resistant to tampering and replication,

03.12.2024 14:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—ฉ๐—  ๐—ฆ๐—ฝ๐—ฟ๐—ฎ๐˜„๐—น: The Silent Efficiency Killer in Cloud Infrastructure
Virtual Machine (VM) sprawl occurs when an organization creates more virtual machines than it can effectively manage, leading to:

-Increased operational costs
-Reduced system performance
-Unnecessary resource consumption
-Complex infra

02.12.2024 14:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐—™๐—ผ๐—ผ๐˜๐—ฝ๐—ฟ๐—ถ๐—ป๐˜๐—ถ๐—ป๐—ด and ๐—ณ๐—ถ๐—ป๐—ด๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐—ป๐˜๐—ถ๐—ป๐—ด are reconnaissance techniques in cybersecurity, but they differ in scope and purpose. Footprinting involves gathering general information about a target system, organization, or network. This can include details like IP ranges, domain names, and public-facing assets,

29.11.2024 14:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

I hope that you and your family have an opportunity to make some great memories today. Step away from your keyboards and spend time with those who matter most. Happy Thanksgiving!

28.11.2024 14:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—ก๐—ฒ๐˜€๐˜€๐˜‚๐˜€ ๐—˜๐˜€๐˜€๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ offers cybersecurity enthusiasts and IT professionals an accessible entry point into vulnerability scanning. This free version of the Nessus Vulnerability Scanner enables users to quickly set up network scans, providing invaluable hands-on experience in identifying potential securi

27.11.2024 18:00 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐—ด๐—ฟ๐—ฎ๐—ฝ๐—ต๐—ถ๐—ฐ ๐—˜๐—ฟ๐—ฎ๐˜€๐—ฒ (CE) is a data sanitization method that removes data by deleting the encryption key that was used to encrypt the data, rendering the encrypted data unrecoverable. Key security concerns include proper key destruction, verification of the original encryption implementation, and ens

27.11.2024 14:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

A zero-fill erase is a data sanitization technique that systematically overwrites all storage sectors of a digital device with binary zeros (0s), attempting to eliminate previously stored information by replacing existing data with a uniform zero state. While simple to execute, this method is consid

26.11.2024 14:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Have you filed your Beneficial Ownership Information (BOI)? Be cautiousโ€”some individuals are sending out notices and charging fees of $500 or more to file on your behalf. While the BOI filing requirement is legitimate, these fees are not mandated by the Federal Government. Consider sharing this info

25.11.2024 17:02 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—ฅ๐—ฒ๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ฃ๐—ผ๐—ถ๐—ป๐˜ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ (๐—ฅ๐—ฃ๐—ข) is the maximum acceptable duration of data loss during a system failure or disaster, representing the point in time to which data must be recovered after an incident.

#cybersecurity #cyber #CySA #teamSC

25.11.2024 14:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

The Mayflower Compact - as it is known today - was signed by those 41 โ€œtrueโ€ Pilgrims on 11 November, 1620, and became the first governing document of Plymouth Colony. Of the 41 men who signed, three were related to me.

John Howland (9th great-grandfather)
John Tilley (10th great-grandfather)
Edwar

23.11.2024 14:02 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Post image

๐—ฅ๐—ฒ๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ง๐—ถ๐—บ๐—ฒ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ (๐—ฅ๐—ง๐—ข): The maximum acceptable amount of time a system, application, or process can be down after a disruption before normal operations must be restored to avoid significant impact.

#cybersecurity #CySA #levelup #teamSC

22.11.2024 20:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—ฃ๐—ผ๐—ฟ๐˜ ๐Ÿญ๐Ÿญ๐Ÿฌ is used by the ๐—ฃ๐—ผ๐˜€๐˜ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ผ๐—ฐ๐—ผ๐—น ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ป ๐Ÿฏ (๐—ฃ๐—ข๐—ฃ๐Ÿฏ) to retrieve emails from a mail server. Security concerns include unencrypted communication, making it vulnerable to interception; susceptibility to man-in-the-middle attacks; brute force attacks due to weak passwords; and the lack of mode

22.11.2024 14:01 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—ฃ๐—ผ๐—ฟ๐˜ ๐Ÿฑ๐Ÿฏ is used by ๐——๐—ก๐—ฆ (๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—ก๐—ฎ๐—บ๐—ฒ ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ) for resolving domain names into IP addresses.

- ๐—จ๐——๐—ฃ: Handles regular DNS queries for speed.
- ๐—ง๐—–๐—ฃ: Used for large data transfers, like DNS zone transfers.

๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ถ๐˜€๐—ธ๐˜€:
- Spoofing/Poisoning: Redirecting traffic to malicious sites.
- Amplifica

21.11.2024 14:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Scottish man linked to hacking group 'Scattered Spider' among five charged in US Tyler Robert Buchanan, 22, has been charged with wire fraud offences in Los Angeles in connection with a series of sophisticated phishing attacks alleged to have been carried out by a cybercrime group...

Five people have been arrested in the US and are alleged to be members of the Scattered Spider criminal gang. This gang is suspected of being behind the MGM attack.

#cybercrime #cybersecurity

news.sky.com/story/scotti...

21.11.2024 11:18 โ€” ๐Ÿ‘ 21    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Looking for Incident Response Playbooks? Check out this website to get some free templates as a starting point.

---> www.incidentresponse.com/

#cybersecurity #teamSC #levelup

20.11.2024 20:00 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—ฉ๐—ผ๐—น๐˜‚๐—บ๐—ฒ-๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฎ๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€ in cybersecurity refers to examining large amounts of data, such as logs or network traffic, to identify patterns, anomalies, or trends that could indicate potential security threats, such as DDoS attacks or unauthorized access attempts. It focuses on the quantity of activity r

20.11.2024 14:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@dkeefe is following 19 prominent accounts