Dennis Keefe
banner
dkeefe.bsky.social
Dennis Keefe
@dkeefe.bsky.social
CompTIA Security+ | LPI Linux Essentials | Former Law Enforcement | OSINT Enthusiast | Christ Follower https://www.linkedin.com/in/dkeefe/
DNS Dumpster is a free OSINT tool for passive DNS reconnaissance, widely used in cybersecurity for network footprinting and attack surface mapping.

dnsdumpster.com
March 11, 2025 at 2:56 AM
If you're planning to launch a new website to start the year strong, my wife would be thrilled to work with you! Check out her business at [Close to the Coast Creative](closetothecoastcreative.com/).
January 10, 2025 at 4:00 PM
December 25, 2024 at 3:00 PM
Wishing you all a very Merry Christmas!
December 24, 2024 at 3:00 PM
Demystifying 𝗦𝗶𝘅 𝗦𝗶𝗴𝗺𝗮 in Cybersecurity: Precision in Threat Reduction

Six Sigma isn't just a manufacturing methodology—it's a powerful approach to minimizing security vulnerabilities and operational risks. Here's how cybersecurity professionals leverage this strategic framework:

Key Principles:
December 12, 2024 at 2:01 PM
Snowflake Systems: A Cybersecurity Minefield

In the world of enterprise IT, "Snowflake Systems" represent a unique cybersecurity challenge. These are highly customized, one-of-a-kind IT infrastructures that evolve organically within organizations.

Key Risks:
• Extreme customization makes consisten
December 11, 2024 at 2:00 PM
Understanding 𝗦𝗲𝗿𝘃𝗶𝗰𝗲-𝗢𝗿𝗶𝗲𝗻𝘁𝗲𝗱 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 (SOA) in cybersecurity:

- SOA is a design approach where services (self-contained units of functionality) are provided to other components via a network.

- These services are loosely coupled, meaning they function independently and can be reused across d
December 10, 2024 at 2:00 PM
An 𝗼𝗻-𝗽𝗮𝘁𝗵 𝗮𝘁𝘁𝗮𝗰𝗸 is a type of cybersecurity threat where an attacker intercepts and potentially alters communication between two parties by positioning themselves between the sender and receiver of network traffic. The attacker can eavesdrop on data transmission, steal sensitive information, or man
December 9, 2024 at 2:00 PM
𝗕𝗶𝗼𝗺𝗲𝘁𝗿𝗶𝗰 𝗶𝗺𝗽𝗲𝗿𝘀𝗼𝗻𝗮𝘁𝗶𝗼𝗻 involves spoofing or mimicking biometric traits, such as fingerprints, facial features, or voice patterns, to bypass authentication systems. While biometrics enhance security through unique identifiers, practitioners must address vulnerabilities like deepfake technology, repl
December 6, 2024 at 2:00 PM
A 𝗧𝗿𝘂𝘀𝘁𝗲𝗱 𝗙𝗼𝘂𝗻𝗱𝗿𝘆 is a secure, vetted manufacturing facility for producing sensitive hardware components, ensuring the integrity and authenticity of chips and devices used in critical systems. It is a cornerstone of supply chain security, reducing the risk of tampering, counterfeits, and backdoors.
December 5, 2024 at 2:00 PM
𝗔𝘁𝗼𝗺𝗶𝗰 𝗲𝘅𝗲𝗰𝘂𝘁𝗶𝗼𝗻 refers to the process of ensuring that a series of operations in a system are completed entirely or not at all, preventing partial execution. This is critical in maintaining data consistency and system reliability. Security concerns include vulnerabilities to race conditions, rollba
December 4, 2024 at 2:00 PM
A 2023 survey found that two-thirds of Gen Z respondents reported being targeted for online “sextortion”, with 71% of those who cited catfishing as the “hook” into sextortion saying they were asked primarily to share intimate imagery or personal information.

#cybersecurity #childsafety #awareness
December 3, 2024 at 6:00 PM
A 𝗣𝗵𝘆𝘀𝗶𝗰𝗮𝗹 𝗨𝗻𝗰𝗹𝗼𝗻𝗮𝗯𝗹𝗲 𝗙𝘂𝗻𝗰𝘁𝗶𝗼𝗻 (𝗣𝗨𝗙) is a hardware-based security feature that leverages the inherent physical variations in a device's manufacturing process to generate unique, unclonable identifiers or cryptographic keys. While PUFs enhance security by being resistant to tampering and replication,
December 3, 2024 at 2:00 PM
𝗩𝗠 𝗦𝗽𝗿𝗮𝘄𝗹: The Silent Efficiency Killer in Cloud Infrastructure
Virtual Machine (VM) sprawl occurs when an organization creates more virtual machines than it can effectively manage, leading to:

-Increased operational costs
-Reduced system performance
-Unnecessary resource consumption
-Complex infra
December 2, 2024 at 2:00 PM
𝗙𝗼𝗼𝘁𝗽𝗿𝗶𝗻𝘁𝗶𝗻𝗴 and 𝗳𝗶𝗻𝗴𝗲𝗿𝗽𝗿𝗶𝗻𝘁𝗶𝗻𝗴 are reconnaissance techniques in cybersecurity, but they differ in scope and purpose. Footprinting involves gathering general information about a target system, organization, or network. This can include details like IP ranges, domain names, and public-facing assets,
November 29, 2024 at 2:00 PM
I hope that you and your family have an opportunity to make some great memories today. Step away from your keyboards and spend time with those who matter most. Happy Thanksgiving!
November 28, 2024 at 2:00 PM
𝗡𝗲𝘀𝘀𝘂𝘀 𝗘𝘀𝘀𝗲𝗻𝘁𝗶𝗮𝗹𝘀 offers cybersecurity enthusiasts and IT professionals an accessible entry point into vulnerability scanning. This free version of the Nessus Vulnerability Scanner enables users to quickly set up network scans, providing invaluable hands-on experience in identifying potential securi
November 27, 2024 at 6:00 PM
𝗖𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝗶𝗰 𝗘𝗿𝗮𝘀𝗲 (CE) is a data sanitization method that removes data by deleting the encryption key that was used to encrypt the data, rendering the encrypted data unrecoverable. Key security concerns include proper key destruction, verification of the original encryption implementation, and ens
November 27, 2024 at 2:00 PM
A zero-fill erase is a data sanitization technique that systematically overwrites all storage sectors of a digital device with binary zeros (0s), attempting to eliminate previously stored information by replacing existing data with a uniform zero state. While simple to execute, this method is consid
November 26, 2024 at 2:00 PM
Have you filed your Beneficial Ownership Information (BOI)? Be cautious—some individuals are sending out notices and charging fees of $500 or more to file on your behalf. While the BOI filing requirement is legitimate, these fees are not mandated by the Federal Government. Consider sharing this info
November 25, 2024 at 5:02 PM
𝗥𝗲𝗰𝗼𝘃𝗲𝗿𝘆 𝗣𝗼𝗶𝗻𝘁 𝗢𝗯𝗷𝗲𝗰𝘁𝗶𝘃𝗲 (𝗥𝗣𝗢) is the maximum acceptable duration of data loss during a system failure or disaster, representing the point in time to which data must be recovered after an incident.

#cybersecurity #cyber #CySA #teamSC
November 25, 2024 at 2:00 PM
The Mayflower Compact - as it is known today - was signed by those 41 “true” Pilgrims on 11 November, 1620, and became the first governing document of Plymouth Colony. Of the 41 men who signed, three were related to me.

John Howland (9th great-grandfather)
John Tilley (10th great-grandfather)
Edwar
November 23, 2024 at 2:02 PM
𝗥𝗲𝗰𝗼𝘃𝗲𝗿𝘆 𝗧𝗶𝗺𝗲 𝗢𝗯𝗷𝗲𝗰𝘁𝗶𝘃𝗲 (𝗥𝗧𝗢): The maximum acceptable amount of time a system, application, or process can be down after a disruption before normal operations must be restored to avoid significant impact.

#cybersecurity #CySA #levelup #teamSC
November 22, 2024 at 8:00 PM
𝗣𝗼𝗿𝘁 𝟭𝟭𝟬 is used by the 𝗣𝗼𝘀𝘁 𝗢𝗳𝗳𝗶𝗰𝗲 𝗣𝗿𝗼𝘁𝗼𝗰𝗼𝗹 𝘃𝗲𝗿𝘀𝗶𝗼𝗻 𝟯 (𝗣𝗢𝗣𝟯) to retrieve emails from a mail server. Security concerns include unencrypted communication, making it vulnerable to interception; susceptibility to man-in-the-middle attacks; brute force attacks due to weak passwords; and the lack of mode
November 22, 2024 at 2:01 PM