LotL Mitigation: Use deceptive PowerShell or CLI scripts that mimic normal DB actions to confuse and deter attackers.
LotL Mitigation: Use deceptive PowerShell or CLI scripts that mimic normal DB actions to confuse and deter attackers.
Cyber-Deception Techniques:
Honeytokens: Fake records that look valuable but trigger alerts on access.
Deceptive DB Response: Modify responses to appear real but mislead or confuse attackers during SQLi attempts.
Cyber-Deception Techniques:
Honeytokens: Fake records that look valuable but trigger alerts on access.
Deceptive DB Response: Modify responses to appear real but mislead or confuse attackers during SQLi attempts.
Inbound was Internet > Mailu > Proxmox MG (via Wireguard) > Mailcow.
I should have use a lighter weight Mail Transfer Agent vs a full mail stack on the Mailu side. Lesson learned.
Inbound was Internet > Mailu > Proxmox MG (via Wireguard) > Mailcow.
I should have use a lighter weight Mail Transfer Agent vs a full mail stack on the Mailu side. Lesson learned.
We'll always have a spot for you @mdf1109.bsky.social ❤️
We'll always have a spot for you @mdf1109.bsky.social ❤️
Okay, off to do this "adult" thing.... stupid adulting... ::grumble grumble::
Okay, off to do this "adult" thing.... stupid adulting... ::grumble grumble::