Security Operations Budgeting: CapEx vs OpEx
Security Operations Budgeting: CapEx vs OpEx Introduction Regardless of business size, security is a non-negotiable necessity and should be accessible on all fronts. Before the popularity of the “as a service” cloud delivery model, businesses had to own their security infrastructure or lease them. A study conducted by IDC found that spending on security-related hardware, […]
How to Setup a Custom Domain Name for GoPhish on AWS
How to Setup a Custom Domain Name for GoPhish on AWS Introduction AWS makes it easy to set up a custom domain name for GoPhish, allowing you to protect your identity, keep emails out of spam folders, and prevent your phishing simulations from being blocked. In this article, we will guide you step by step […]
How to Setup a Microsoft SMTP on Gophish
How to Setup a Microsoft SMTP on Gophish Introduction Whether you’re conducting a phishing campaign to test your organization’s security or optimizing your email delivery process, a dedicated SMTP server can simplify your email workflow and improve your overall email performance. Microsoft’s Simple Mail Transfer Protocol (SMTP) server is a reliable and easy-to-use option for […]
SOCKS5 Proxy QuickStart: Setting up Shadowsocks on AWS
SOCKS5 Proxy QuickStart: Setting up Shadowsocks on AWS Introduction In this comprehensive article, we will explore setting up a SOCKS5 proxy using Shadowsocks on Amazon Web Services (AWS). You’ll learn how to configure the proxy server on AWS and set up a proxy client locally to establish a secure and efficient connection. You can provision […]
AWS Networking: VPC Configuration for Public Instance Accessibility
AWS Networking: VPC Configuration for Public Instance Accessibility Introduction As businesses move more of their operations to the cloud, having a deep understanding of Amazon Web Services (AWS) and its networking capabilities becomes increasingly important. One of the foundational building blocks of AWS networking is the Virtual Private Cloud (VPC) – a network that you […]
Top 3 Phishing Tools for Ethical Hacking
Top 3 Phishing Tools for Ethical Hacking Introduction While phishing attacks can be used by malicious actors to steal personal data or spread malware, ethical hackers can use similar tactics to test for vulnerabilities in an organization’s security infrastructure. These tools are designed to help ethical hackers simulate real-world phishing attacks and test the response […]