Skip to main content

Posts

Showing posts from August, 2022

CLOUD MODELS – PROS AND CONS – PRIVATE CLOUD – IAAS

  It is up to the IT department and infrastructure to provide scalable, secure, high performing and fast deliverable solutions that will aid the business to be successful. CIOs have to make the critical decision to choose the right infrastructure that will meet the demands of the business and the market. A bad decision can be the demise of a line of business or the business as whole. With all the IT infrastructure options we have at our disposal as of 2021, IT CIOs need to pick what makes sense from a cost, speed to deliver, performance, scalability and security. To name a few. This article will provide information on the different cloud computing models. I will go over the advantages and disadvantages of the four most widely cloud models. Private Cloud (on prem). IaaS (Infrastructure as a Service). PaaS: (Platform as a Service). SaaS: Software as a Service Consider Donating   to allow me to make more useful videos for you  and keep this space (your space) ad free. When you donate I wi

Microsoft Account Verification Scam

Today I received an email allegedly from Microsoft. They wanted me to click on a link to confirm mi info. DO NOT CLICK ON IT!!       ALWAYS ALWAYS Click on the sender email address to confirm the sender. If it looks or feels illegitimate don't click on it. It is a phishing attack. Microsoft phishing Scam Consider Donating to allow me to make more useful videos for you  and keep this space (your space) ad free. When you donate I will provide a discount code in my training store . Go to the discount page here. Go to the Training store for mode in-depth training Go to the Training Inde x to checkout all the courses we have available Disclaimer : The information posted here is informational only. Ricardo Gutierrez won’t be held liable for any mishaps, failures or any other negative outcome. It is the reader’s responsibility to make their own decisions and act on them.

EASIEST WAY TO BUILD SECURITY GROUP RULES AND ROUTE ENTRIES IN AWS

  Adding IP prefixes to security group rules and route entries can be a time consuming and error prone task, especially when you have to build them on multiple VPCs. The fastest and most accurate method to reuse IP prefixes in your Security groups and route table entries is to use “Managed Prefix List“. This will save you time to build your security group rules and your route table entries. When you build several security group, you have to specify the IP prefixes on EVERY Security group rule . If you have a rule with 10 or more IP prefixes you need to add them manually; it becomes a time consuming and error prone task. Even if you automate this process (eg. Terraform, CloudFormation) you still have to build your code for each security group for every VPC. Another advantage is when you use the “managed prefix list” When you build Route tables you need to specify IP prefixes. You may have multiple IP prefixes, this can also be a time consuming and error prone task.  You will have to add

HOW TO SETUP TWO-FACTOR AUTHENTICATION IN WORDPRESS

  WordPress websites are amongst the most attacked websites on the internet. Once you bring your website online, it will be under attack by hackers and they will try to crack the user and password. WordPress is susceptible to a myriad if attacks as well, but for now I will only demonstrate how to protect your user credentials. The use of user and password puts your website at tremendous risk. To mitigate that vulnerability  you must setup two-factor authentication. The most effective and secure two factor authentication method is the use of a security key.  TOTP key fobs and text messages (SMS) are phishable, thus hacker can obtain the One Time Password (OTP) rendering them useless. Consider Donating   to allow me to make more useful videos for you  and keep this space (your space) ad free. When you donate I will provide a discount code in my   training store . Go to the discount page here.   Go to the  Training store  for mode in-depth training  Go to the  Training Index  to checkout

HOW TO BLOCK NAT SLIPSTREAMING ON PALO ALTO FIREWALLS

  Update: 02/10/2021 If you are using threat DB version 8373-6537, the default action now is reset-server. The main objective of Cybersecurity professionals, is to reduce the attack surface, on network connected devices (computers, IoT, hvac, smart UPSs, smart power strips, etc.). Cybersecurity professionals often assume that devices that have no internet connectivity will never be compromised by a hacker. The NAT slipstreaming cyberattack proves this wrong. “ NAT Slipstreaming allows an attacker to remotely access ANY TCP/UDP service bound to ANY system behind a victim’s NAT, bypassing the victim’s NAT/firewall (remote arbitrary firewall pinhole control),  all it takes is the victim’s computer to visit the attacker’s website”. Once the victim’s computer visits the website, the attacker’s servers start to scan your network to identify the network connected devices. If your devices have not been patched to mitigate vulnerabilities, the attackers will exploit these to take control over

HOW TO BUILD THE ULTIMATE FIREWALL RULE

  The Data Center and cloud environment are highly dynamic, hence the creation of new firewall rules is in high demand. In this video I will demonstrate how to build the ultimate firewall rule on Palo Alto Networks firewalls for  the data center and the cloud. I will demonstrate how to build a highly secure firewall rule, that will utilize the following: threat prevention profiles: antivirus, anti-spyware, vulnerability protection, file blocking, URL Filtering & Wildfire. I will also demonstrate how to minimize the number of firewall rules that need to be built or modified. This will cut down by at least 4-fold your access to you application. Consider Donating   to allow me to make more useful videos for you  and keep this space (your space) ad free. When you donate I will provide a discount code in my   training store . Go to the discount page here.   Go to the  Training store  for mode in-depth training  Go to the  Training Index  to checkout all the courses we have available  Di

WHY SHOUD YOU USE USER-ID FIREWALL RULES?

  HOW MANY TIMES HAVE YOU THOUGHT OF…  Is there a way to track what my users are connecting to?  Is there a way to track what applications my users are using and the amount of bytes being transmitted based on each application?  Is there a way to allow / block users to access specific zones / segments of my network based on their user id?  Is there a way to not have to allow access using their windows user ID instead of IP whitelisting IP addresses?  Is there a way to easily create usage reports per access group or user-id? Palo Alto Networks has made your wish come true. If you have been a Network Engineer for as long as I have, you will find that Palo Alto Firewalls takes away all those cumbersome and time consuming tasks. Palo Alto’s Next Generation features give you a lot of control and make your life easier. Now if you combine the use of Panorama to manage your firewalls, you will make your life a whole lot easier and you will be able to perform more complicated tasks. User-ID is

How to Automatically Blocklist and Attacker's IP address using Palo Alto Networks.

Network Security engineers rely and trust the blacklist feeds, whether they get that from minemeld or from mxtoolbox, spanhaus, ipinfo and others. For the most part these are quite accurate, however, hackers are crafty and switch public IP addresses frequently. To keep the databases up to date in real time is extremely challenging, to say the least. So, what can you do to keep up with the ever changing harmful IP addresses? You need to inspect traffic for threats and vulnerabilities on a Palo Alto Networks Firewall. Once the firewall detects the threat and the attacker’s public IP address, the firewall will then automatically add the attacker’s IP address in a Deny firewall rule. Important : You must make sure you are blocking critical, high and medium risk threat at bare minimum. Why do I need to blacklist the attacker’s IP address if my firewall is already blocking threats? The answer is simple, you don’t know what other vulnerabilities the attackers are trying to exploit. The firewa