Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exploiting Weak Active Directory Permissions with PowerSploit

Adversaries use multiple techniques to identify and exploit weaknesses in Active Directory (AD) to gain access to critical systems and data. This blog post explores 3 ways they use PowerShell PowerSploit to elevate or abuse permissions, and offers effective strategies for protecting against them.

Beware of Agreement Fraud: Scammers Targeting CEO's with Agreement Draft

Introduction: Fraudulent campaigns aimed at top-level executives through phishing are on the rise. In this technical blog post, we will delve into a particular type of CEO phishing scam that employs an attachment containing an agreement draft. We will examine the attack's technical aspects and suggest preventive measures that businesses can adopt to safeguard themselves.

Examples of Digital Signatures & Certificates for Organizations

Digital signature certificates are a must-have for any organization interested in ensuring the authenticity of its data and transactions. As a software developer, you can use them to sign software updates or as a sales manager to authenticate contracts. Digital signature certificates are the ultimate guarantee of security and validity. Digital signature certificates provide a secure and reliable way to verify and authenticate data.

Cloud Identity Security: It Doesn't Taste Like Chicken

There’s a scene in the original “Matrix” movie when Neo is sitting in the grimy kitchen with the rest of the crew and eating gray, runny slop. No matter what new version of gray slop they eat, they always seem to think that it tastes like chicken. When confronted with something new, it’s a natural human trait to relate it back to something we already know.

Another Expression DoS Vulnerability Found in Spring - CVE-2023-20863

Just recently, our open-source fuzzing engine Jazzer found an Expression DoS vulnerability in Spring (CVE-2023-20861). Now, three weeks later, Jazzer found another similar Expression DoS in the Spring framework, labeled CVE-2023-20863. This new finding has an even higher CVSS score of 7.5 (high), compared to the previous finding which came in at 5.3 (medium).

Nexx Security Components Aren't Safe, Say Security Experts

Nexx is a home security company that specializes in internet-connected security devices such as alarms, garage door openers, cameras, plugs, and more. The company works to make homes safer and to help with home automation goals. Unfortunately, it appears that Nexx products are vulnerable to some major security issues, and it doesn't appear that the company is actively working to fix the issues.

Choosing The Right IAM Solution For Your Business

Password security plays a fundamental role in Identity and Access Management (IAM). The easiest way for cybercriminals to breach an enterprise network is to obtain a set of legitimate login credentials. This allows them to bypass firewalls, intrusion detection systems and other technical security solutions. Once inside, they can remain undetected for extended periods of time.

How Advanced Continual Threat Hunting Takes MDR and Cybersecurity to the Next Level

When researching which managed detection and response (MDR) service provider to partner with, security professionals would do well to consider whether the provider also has experience with threat hunting, a topic we covered in a previous post. As with MDR, however, threat hunting offerings can vary dramatically, and an innovative, human-led form promises significant gains in terms of cyber protection: advanced continual threat hunting.