April 7, 2020

Author: Jake

SYN ACK Becomes CyberCBK

Given a recent dispute over our use of SYN ACK by Synack, we have been force to change our name. Going forward, we will be known as CyberCBK.co.uk – please update your bookmarks! Logos and social pages will follow suit shortly. We lose access to the domain on the 13th August 2018. Thank you all […]

Common Firewall Issues

One thing I come across time and time again are poorly configured firewalls. The reason for this is largely down to the people who configure them. Companies often put all their eggs in one basket when it comes to IT services which means people who perhaps aren’t best suited to managing security products, end up […]

Nominet :: A flawed organisation

Needless to say, the content of this post is my personal opinion, it’s biased, but based on my experiences whilst dealing with Nominet in a recent dispute related to this blog. I felt it necessary to write about my experiences with Nominet. As I have posted about recently, since March 2017 I have been involved […]

A sad day indeed.

Today, I must unfortunately announce the loss of our name SYNACK.co.uk. Since March 2017 I have been involved in a dispute with Synack.com regarding our use of the name “SYN ACK”. We have until 13th August 2018 to change our name. I’m not blind, I can see that Synack and SYN ACK contain the same […]

Common SIEM Problems

As there’s been a lot of SIEM hype over the last few years, I’d thought I’d go over a few common problems I’ve come across whilst deploying new, and fixing existing SIEM deployments. This won’t be a complete list, but just some of the most common. I may update this post from time to time. […]

Crypto Jacking – The New Threat

In this post I will discuss the new threat of Crypto Jacking – what it is, where it came from and why you should be on the look out. What is Crypto Jacking? Crypto Jacking is where malicious code is installed on your infrastructure/Computer with the aim of using your processing power to mine Crypto […]

DNS Sinkhole – What is it & Why do I need one?

In this post I will talk about DNS Sinkholing, what it is and how it can help you identify potentially infected machines. Useful in the fight against malware such as viruses, Ransomware and Crypto Jacking! What is DNS? Domain Name System – in very basic terms, the internet (and local networks) are all routed by […]

FortiGate :: HA Routed Failover w/ Session Failover

A recent requirement that came up was for there to be a redundant pair of firewalls, which allowed for session failover, configuration synchronisation and also maintain different external IPs and seperate BGP peering. A niche request, but something that was supported with FortiGates. Below details some configuration examples to achieve this. Config and Session Sync […]

Security Concerns :: Ransomware

Working for a security consultancy/MSSP business, I come across a lot of customers who in the past have gone to companies seeking advice on a particular security threat that is getting more media attention at that particular moment. More often than not, the “Security Expert” (salesman…) sells them a device; promising┬áthem it will fix all […]

Kali Linux :: Email Harvesting

In this post, I will show you a tool in Kali Linux that’s able to harvest email addresses that are publicly available on the internet. Why do I want to harvest emails? When working with a company to run a phishing campaign against you (for testing purposes), or indeed a hacker running a malicious phishing […]
Page 1 of 212 »

Subscribe to SYNACK via Email