PJSF Group - Improving Life
PJSF Group - Improving Life
  • Home
  • Services
    • Services
  • Entertainment & Industry
  • Events
  • Online Appointments
  • One World Touring
  • Events
  • Subscribe
  • More
    • Home
    • Services
      • Services
    • Entertainment & Industry
    • Events
    • Online Appointments
    • One World Touring
    • Events
    • Subscribe
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Services
    • Services
  • Entertainment & Industry
  • Events
  • Online Appointments
  • One World Touring
  • Events
  • Subscribe

Account

  • Bookings
  • My Account
  • Sign out

  • Sign In
  • Bookings
  • My Account

PJSF Blog

PJSF Social

Visualising Science, Lifestyle and Technology Innovations Globally

    Huntress - The Best Of Cyber

    How Adversary-in-the-Middle (AiM) Attacks Steal Session Tokens & Bypass MFA

    Adversary-in-the-Middle (AitM) attacks are one of the most dangerous ways threat actors bypass MFA and hijack accounts, without using malware. In this video, SOC Analyst Faith Stratton explains how AitM works, from token theft to stealthy persistence. 


    Learn how attackers hijack browser sessions with tools like Evil Jinx and Modlishka, and how they blend in with legitimate Microsoft tools to evade detection.


    SOC Walkthrough: The Anatomy of a VPN Compromise

    Ever wonder what goes on behind the scenes within telemetry during a VPN compromise? Let's peel back the layers and find out!


    Here's what went down at a manufacturing company:

    This organization had Huntress SIEM in place, and an alert triggered as soon as the threat actor authenticated within their network using a known malicious workstation name


    At this point, the host was isolated to prevent further lateral movement and follow-on activity.

    Upon a review of the VPN logs, the source of this intrusion was uncovered: a forgotten "Guest" account enabled on the VPN appliance


    Here's the cool part - further analysis of the malicious IP address revealed that this threat actor was exposing RDP and leaking their hostname - this hostname matched up exactly with the Windows authentication events within the victim network!


    Threat actors are always looking for weak spots in your network, don't give them an inch!

    Ensure all unused accounts are disabled on your VPN appliances. Always enable MFA for all your VPN accounts, yes even VIPs 

    Hollywood Gets Hacking Right?! Breaking Down a Hospital Ransomware Scene


    Accurate scare tactics: Falsely claiming botnet worms could brick MRI & X-ray machines.


    Negotiations gone wrong: How one bad move can make attackers more aggressive.


    Legit data recovery methods: Physical hard drive repairs, BIOS restores, and exploiting encryption flaws.


    No Hollywood fluff: Minimal fake “hacking UIs”—just the gritty technical process.


    If you’re tired of unrealistic “movie hacking,” you’ll love this scene’s attention to detail—and how closely it mirrors what actually happens in ransomware attacks.



    Protect Your Endpoints, Identities, Logs, and Employees.


    The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Cen

    130,000 Leaked Records Offered As Give A Way, Telegram

    What do Costco samples and stolen data have in common?


    In this Tradecraft Tuesday clip, the Huntress team walks through a shady "giveaway" on Telegram—allegedly offering thousands of U.S. credit card records, SSNs, and other personal info. But this isn’t just shock value. This is how cybercriminals operate, market, and weaponize stolen data.


    We’ll explore:


    A massive “free sample” of leaked data being used to bait buyers


    How ransomware groups and initial access brokers market themselves


    Why even red teamers and offensive security pros use this data


    What defenders should do when this stuff hits the surface


    It’s messy. It’s real. It’s the dark web.


    NASA

    Artemis 2

    Lunar

    Beyond

    Music and Videos

    Artemis 1

    Ride along with NASA’s Orion capsule on the Artemis I mission around the Moon and back.


    At 1:47 a.m. EST (6:47 UTC) on Nov. 16, 2022, NASA’s Orion spacecraft launched atop the Space Launch System (SLS) rocket from historic Launch Pad 39B at NASA’s Kennedy Space Center on a path to the Moon, officially beginning the Artemis I mission. Over the course of 25.5 days, Orion performed two lunar flybys, coming within 80 miles (129 kilometers) of the lunar surface. At its farthest distance during the mission, Orion traveled nearly 270,000 miles (435,000 kilometers) from our home planet. NASA’s Orion spacecraft successfully completed a parachute-assisted splashdown in the Pacific Ocean at 9:40 a.m. PST (12:40 p.m. EST) as the final major milestone of the Artemis I mission.

      

    Artemis I was the first integrated test of NASA’s deep space exploration systems – the Orion spacecraft, SLS rocket, and the supporting ground systems – and the first in a series of increasingly complex missions at the Moon. Over the course of the flight test, flight controllers tested Orion’s capabilities in the harsh environment of deep space to prepare for flying astronauts on Artemis II. Through Artemis missions, NASA will establish a long-term lunar presence for scientific discovery and prepare for human missions to Mars.


    Credit: NASA

    The Intuitive Machines-2 mission

    The Intuitive Machines-2 mission is set to launch the company's lunar lander, Athena, to the Moon. Athena will carry NASA science experiments and technology demonstrations to help us understand the Moon’s environment, and prepare for future human missions to the lunar surface.

     

    One piece of tech aboard, the Polar Resources Ice Mining Experiment 1 (PRIME-1), is one of the first on-site demonstrations of resource use on the Moon. PRIME-1 will take a lunar soil sample and  analyze it to see if it contains water ice.


    Credit: NASA

    Curiosity explores Spiderwebs Mars

    rag your mouse or move your phone to explore this 360-degree panorama provided by NASA’s Curiosity Mars rover. This view shows some of the rover’s first looks at a region that has only been viewed from space until now, and where the surface is crisscrossed with spiderweblike patterns.


    00:00 Title

    00:08 Intro

    00:26 Labeled Image

    00:50 Groundwater Rock Vein

    01:43 Unlabeled Image


    First seen in the years before Curiosity landed in 2012, these patterns are boxwork formations — a kind of low ridge, some just a few inches tall, created by groundwater as it soaks into subsurface rock cracks. That groundwater left behind minerals that accumulated in those cracks, hardening and becoming cementlike. Eons of sandblasting by Martian wind wore away the rock but not the minerals, revealing networks of resistant ridges within.


    This video will show you rover tracks left by Curiosity, some of the boxwork ridges and an example of a white mineral vein found running through a rock crack — another sign of how groundwater shaped this area.


    This panorama is stitched together from 291 individual images captured by the rover’s Mast Camera, or Mastcam, between May 15 and May 18, 2025 (the 4,451st Martian day, or sol, of the mission and the 4,454th sol). The color in these images has been adjusted to match the lighting conditions as the human eye would see them on Earth.


    Note on best viewing: Not all browsers support 360-degree videos. YouTube supports playback on computers using Chrome, Firefox, MS Edge, and Opera browsers. For the best experience on a mobile device, play this video in the YouTube app. To improve the resolution, open the video settings (using the gear icon) and select the highest quality available.



    Credit: NASA/JPL Caltech, MSSS

    John A Moody

    International Observe The Moon Night 

    The John Moody Band

    Under A Blood Grey Sky

    The John Moody Band

    Bleed Me Dry


    Hitting Top 10 Alternative Singles, Nov 2024



    Available everywhere

    One Dollar Manaagement

    The Ai Show Tonight With JohnM

    Oct 31st, ODM TV, Weekly


    Soundtrack Credit - Lamb Of God, Hourglass

    • ”Its Only Getting Worse”
    • Written by: David Randall Blythe, John Campbell, Chris Adler, Will Adler, Mark Morton
    • Album: Ashes Of The Wake

    1. Released: 2004

    • Image and Acting: John Allan Moody

    The John Moody Band - The Promise

    The 3rd Single Release from Sept 5th

    The John Moody Band - Bleed Me Dry

    Purchase direct from our, One Dollar Management Label

    The John Moody Band - Grey

    Produced by Wernher Pramschuffer (Pink Floyd)

    Written, all instruments and Vocals - John Allan Moody


    Registered Works - APPRAMCOS

    The John Moody Band - Time

    The John Moody Band - Under A Blood Grey Sky

    Copyright © 2025 Pacific Joint Space Facility,  John Allan Moody, All Rights Reserved, 

    This website uses cookies.

    We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data. 

    DeclineAccept