Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JUMPSEC

Acronym Overload: From SOC to MDR and XDR

As offensive security specialists for over 10 years, we have tested countless organisations who believe their SIEM, EDR or MDR provider offers them comprehensive defense, only to find them lacking in fundamental areas. From our experience, some “traditional” in-house, yet adequately resourced, Security Operations Centres (SOCs) can still provide a robust defense, while others struggle to stay on top of emerging threats.

JUMPSEC - Inside Continuous Attack Surface Management

Inside Continuous Attack Surface Management - Bjoern Schwabe - Head of CASM, explains how we navigate data complexities, filter crucial insights and only true positives to secure your digital footprint. Through real-world examples, bridging the gap between technical intricacies and managerial understanding, gaining clarity on the vital role CASM plays in cybersecurity.

JUMPSEC A red teamer's forecast - Cloudy with a chance of hacks

A red teamer’s forecast – Cloudy with a chance of hacks Our adversarial simulation team will outline how attackers exploit cloud infrastructure and offer strategies to counter their efforts. Key insights involve recognising significant security risks in cloud adoption, including emerging attack vectors, comprehending hacker tactics in cloud settings, and swiftly implementing effective measures to safeguard cloud environments.

JUMPSEC Red Teaming in the cloud forecast for the future

A red teamer’s forecast – Cloudy with a chance of hacks Our adversarial simulation team will outline how attackers exploit cloud infrastructure and offer strategies to counter their efforts. Key insights involve recognising significant security risks in cloud adoption, including emerging attack vectors, comprehending hacker tactics in cloud settings, and swiftly implementing effective measures to safeguard cloud environments.

Lockbit Disrupted: Ransomware Trends Update

Faced with year-on-year rising attack figures, law enforcement have struggled to adapt to the immense task of preventing ransomware and cyber extortion. By tracking and analysing attacker reported victim data, we seek to explore the significance of Lockbit’s recent takedown in the context of prior disruption efforts.

The Evolution of Supplier Risk Management

Recent supply chain attacks, from SolarWinds to 3CX and MOVEit, illustrate the impact that can occur when a single widely used software platform is compromised, thereby enabling attackers to use this initial access as an entry point into any number of subsequent networks. Often the intention is to propagate malware or leverage sensitive data to extort victim organisations.

Red Teaming in the Cloud: A Shift in Perspective

Cloud adoption is exploding, and rightfully so. Businesses are seeing the value of improved agility and efficiency when leveraging public cloud, resulting in 60% of all corporate data globally being stored in the cloud in 2022. As such, securing the cloud is becoming an increasingly important skill for defensive security teams, ergo red teaming the cloud is becoming increasingly important for us offensive security teams too.