Skip to main content

Posts

What is Vulnerability Exploitability eXchange (VEX)?

Vulnerability Exploitability eXchange (VEX) is a platform that allows organizations to track and manage vulnerabilities in their systems and devices. VEX is designed to provide a centralized repository for vulnerability information, making it easier for organizations to identify and prioritize vulnerabilities that need to be addressed. VEX was created by Carnegie Mellon University's CERT Coordination Center (CERT/CC) as a way to improve the management of vulnerabilities and reduce the risk of exploitation. It is based on the Common Vulnerability Scoring System (CVSS), which is a widely-adopted standard for evaluating the severity of vulnerabilities. VEX provides a number of benefits for organizations that use it. By centralizing vulnerability information, it makes it easier for organizations to identify and prioritize vulnerabilities that need to be addressed. It also provides a way for organizations to track the progress of vulnerabilities as they are being addressed, ensuring tha
Recent posts

What is SQL injection and how can we prevent it?

SQL injection is a type of cyber attack that allows attackers to insert malicious code into a web application's SQL statements. This can enable attackers to gain unauthorized access to sensitive data, to manipulate or delete data, or to execute arbitrary commands on the underlying database. SQL injection attacks are possible because many web applications do not properly validate user-supplied input before using it in SQL statements. This allows attackers to craft input that contains malicious SQL code, which is then executed by the database. To illustrate how SQL injection works, let's consider the following example in Java: String username = request.getParameter("username"); String password = request.getParameter("password"); String query = "SELECT * FROM users WHERE username='" + username + "' AND password='" + password + "'"; Statement stmt = connection.createStatement(); ResultSet rs = stmt.executeQuery(que

OWASP Top 10 Vulnerabilities

The OWASP Top 10 is a list of the most critical web application security risks, as identified by the Open Web Application Security Project (OWASP). This list is updated every few years to reflect the latest trends and challenges in web security. The current version, OWASP Top 10 - 2017, was released in 2017 and includes the following vulnerabilities: Injection: Injection attacks occur when an attacker is able to insert malicious code into a web application, allowing them to gain unauthorized access to sensitive data or to manipulate the application. Examples of injection vulnerabilities include SQL injection, LDAP injection, and XML injection. Broken Authentication and Session Management: This category covers vulnerabilities related to the authentication and session management processes of a web application. This can include weaknesses in password policies, session IDs, and authentication tokens, which can allow attackers to gain unauthorized access to an application. Cross-Site Script

What is vulnerability management?

Vulnerability management is the process of identifying, addressing, and preventing security vulnerabilities in computer systems and networks. This process is crucial for maintaining the security and integrity of information and systems, and for preventing security breaches and attacks. A vulnerability is a weakness or flaw in a computer system or network that can be exploited by an attacker to gain unauthorized access or to cause harm. Vulnerabilities can exist in software, hardware, or in the configuration of a system, and they can be introduced through various means, such as software bugs, design flaws, or human error. The first step in vulnerability management is to identify and assess the vulnerabilities in a system or network. This can be done using a variety of tools and techniques, such as vulnerability scanners, penetration testing, and manual inspections. These tools and techniques can help to identify known vulnerabilities, as well as to uncover new and unknown vulnerabilitie

What is vulnerability analysis?

Vulnerability analysis is the process of identifying, analyzing, and prioritizing vulnerabilities in computer systems and networks. This is an important part of an organization's overall security strategy, as it helps to identify and mitigate potential security threats before they can be exploited by malicious hackers. The goal of vulnerability analysis is to identify vulnerabilities that could be exploited to gain unauthorized access to a system or network, or to disrupt its normal operation. Vulnerabilities can be found in a variety of places, including operating systems, applications, networks, and hardware. To conduct a vulnerability analysis, security professionals typically use a combination of manual and automated tools and techniques. This can include scanning tools that search for known vulnerabilities, as well as manual testing methods such as penetration testing and code review. Once vulnerabilities have been identified, they must be analyzed and prioritized based on the

What is the Certified Ethical Hacking (CEH) certification?

The Certified Ethical Hacker (CEH) certification is a widely recognized credential that is designed to validate an individual's knowledge and skills in the field of ethical hacking. To become certified, individuals must pass a rigorous exam that tests their ability to identify and exploit vulnerabilities in computer systems and networks. To prepare for the CEH certification exam, individuals can follow these steps: Understand the exam objectives: The CEH exam covers a wide range of topics, including network security, cryptography, and web application security. Before beginning your study, it is important to understand the exam objectives and the specific topics that will be covered. This will help you to focus your study and ensure that you are prepared for the exam. Study the material: The CEH certification exam is based on the Official Certified Ethical Hacker Review Guide, which is published by the EC-Council. This guide covers all of the topics that will be tested on the exam,

What is ethical hacking?

Ethical hacking, also known as "white hat" hacking, is the practice of using hacking techniques and tools to test and improve the security of computer systems and networks. Unlike "black hat" hackers, who use their skills and knowledge for malicious purposes, ethical hackers are professionals who are hired by organizations to help protect against cyber attacks. Ethical hacking involves using the same methods and tools as malicious hackers, but in a controlled and authorized manner. This allows ethical hackers to identify vulnerabilities and weaknesses in an organization's systems and networks, and provide recommendations on how to fix them. Ethical hacking is an important part of an organization's overall security strategy. By regularly testing and improving the security of their systems and networks, organizations can protect against potential cyber attacks and reduce the risk of sensitive data being accessed or stolen by malicious hackers. Ethical hackers

Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions

With a growing number of cyber-attacks and the frequent news headlines on database breaches, spyware and ransomware, quality security products have become a commodity in every business organization. Consequently a lot of thought is being invested in devising an appropriate information security strategy to combat these breaches and providing the best solutions possible. We have recently found a new and alarming method that allows  any  known malware to bypass even the most common security solutions, such as next generation anti-viruses, inspection tools, and anti-ransomware. This technique, dubbed Bashware, leverages a new Windows 10 feature called Subsystem for Linux (WSL),  which recently exited Beta  and is now a fully supported Windows feature. This feature makes the popular bash terminal available for Windows OS users, and in so doing, enables users to natively run Linux operating system executables on the Windows operating system. Existing security solutions are still not adapted