Skip to main content

Salisbury Meatballs with Mushroom and Onion Gravy

This quick dinner is perfect for leftover ground beef from Baked Ziti and is a versatile weeknight dish. Pair with pappardelle or egg noodles or Roasted Cabbage Wedges for a low-carb hit.

"Swedish Meatballs on Noodles" by Rachelle @ Mommy? I'm Hungry! is licensed under CC BY-NC-ND 2.0
Time: 45 minutes
Active: 30 minutes
Inactive: 15 minutes



  • 2 Lb Ground Beef
  • 1/2 C Bread Crumbs
  • 1/4 C Fresh Chopped Parsley, or 1/2 C dried parsley
  • 1/4 C Minced Onion, dried
  • 1 T Ground Mustard
  • 1 T Beef Bullion powder
  • 4 Dashes Hoff Sauce - Regular
  • 4 Dashes Worcestershire Sauce
  • Salt & Pepper

Mushroom and Onion Gravy

  • 1 White Onion, thinly sliced
  • 2 Cans Sliced Mushrooms, well drained, or 5 fresh sliced button mushrooms
  • 2 C Water
  • 1/2 C Milk
  • 1 T Beef Bullion Powder
  • 1 T Corn Starch



  • In a large metallic mixing bowl, combine all the meatball ingredients, and mix thoroughly.
  • Shape meatballs using a #10 or #15 Disher. (Roughly 3.5oz or 2oz respectively).
  • Place a high-walled heavy-bottom skillet over a medium heat. And begin to heat 1/4C beef tallow, neutral oil, or other animal fat.
  • Working in batches, brown the meatballs on all sides and set aside. (This is meant to brown them, not cook them through.)
  • Once complete, reserve the cooking oil in a heat-proof vessel for future use.

Mushroom and Onion Gravy

  1. In the same pan, introduce the onions, stirring to release the fond from the pan.
  2. Once onions begin to turn translucent, add mushrooms, beef bullion powder, water, and milk. Bring to a low boil.
  3. Re-introduce Meatballs and any expressed juices.
  4. Cook uncovered until largest meatballs reach an internal temperature of 165F.
  5. Remove 1 C of the cooking liquid, and whisk in 1 T corn starch. Pour back into the pan, stirring gently.
  6. Cook 10 minutes or until sauce becomes nappe.
  7. Serve over pappardelle or egg noodles, with fresh parsley to garnish. 

Popular posts from this blog

Show And Tell

Once a week, our security team gathers everyone into a meeting and shares the last week’s worth of security related news and any new security initiatives. This one hour may be the most valuable meeting we attend and has the greatest impact on successful security outcomes. What is it? We call ours a Security Show & Tell. (You can call it whatever fun and exciting name fits your corporate culture.) Regardless of the name, the goal is to set aside an hour each week to share three kinds of security stories and our response to them. Stories that are in the news. Stories that impact our work. Stories that impact our lives. Author’s Note: There’s some helpful tips below on how to gather these stories.  Why you should do it There’s a lot of great reasons to do this, but I want to drive home a few really important ones. How many times has this happened to you? You wake up, open , and begin scrolling only to find out that $Vendor has a nasty zero-day and organiza

LibWebP (CVE-2023-4863)

Here is a non-exhaustive list of possible mitigations to prevent the exploitation of CVE 2023-4863 in the LibWebP library. This library has a heap buffer overflow available across all operating systems, most browsers, an exceptional number of Electron framework applications. This CVE is rated a 10 after previously being rated 8.8. This was due to an original disclosure from Google stating that Chrome was the only effected application. After investigation, it was discovered that all instances of the LibWebP library were vulnerable across all platforms. A similar CVE ( 2023-5217 ) is pending analysis for the VP8 webstream video format (a sister library to libwep.) As working proof-of-concepts are generally available to the public and Google and Apple both acknowledge threat actors and spyware vendors making use of the vulnerability, it is essential that you begin reviewing and patching all business critical applications. Patch Browsers, All of them All major and minor browsers acr

EndleSSH by Chris Wellens (github:skeeto)

  "Los Angeles CA ~ La Brea Tar Pits" by Onasill ~ Bill Badzo - - 70M Views is licensed under CC BY-NC-ND 2.0 I recently completed the SANS SEC503: Network Intrusion Detection course and while there is more than enough information to melt your brain, I picked up a few tricks I'd never seen before. I'd like to share one of the quickest and most practical here. EndleSSH by Chris Wellens is a tarpit for would be SSH brute force attackers. Clearly in the Active Defense column, EndleSSH works by pretending to be an SSH server, and strings the attempted connections along for near infinite amounts of time. An automated attack could sit for weeks tied to this connection before realizing something was wrong. Chris has a ton more information on his website above and on his GitHub. Here's a quick walkthrough:  Configuring EndleSSH on Debian based Droplets Moving SSH To move SSH run the following sed -i 's/#Port 22/Port $PORTYOUWANT/' /etc/ssh/ssh