May 22 2020

To test its security mid-pandemic, GitLab tried phishing its own work-from-home staff. 1 in 5 fell for it

Category: PhishingDISC @ 12:08 am

Welp, at least that’s better than industry averages, says code-hosting biz

Source: To test its security mid-pandemic, GitLab tried phishing its own work-from-home staff. 1 in 5 fell for it

The mock attack simulated a targeted phishing campaign designed to get GitLab employees to give up their credentials.

The GitLab Red Team – security personnel playing the role of an attacker – obtained the domain name gitlab.company and set it up using the open source GoPhish framework and Google’s GSuite to send phishing emails. The messages were designed to look like a laptop upgrade notification from GitLab’s IT department.

“Targets were asked to click on a link in order to accept their upgrade and this link was instead a fake GitLab.com login page hosted on the domain ‘gitlab.company’,” explained security manager Steve Manzuik in a GitLab post.

“While an attacker would be able to easily capture both the username and password entered into the fake site, the Red Team determined that only capturing email addresses or login names was necessary for this exercise.”

Fifty emails went out and 17 (34 per cent) clicked on the link in the messages that led to the simulated phishing website. Of those, 10 (59 per cent of those who clicked through or 20 per cent of the total test group) went on to enter credentials. And just 6 of the 50 message recipients (12 per cent) reported the phishing attempt to GitLab security personnel.

Download a CyberAware Cheat Sheet


May 21 2020

Santander, one of the biggest European banks, was leaking sensitive data on their website

Category: Data BreachDISC @ 11:51 pm

Santander Consumer Bank, the Belgian branch of the bank, had a misconfiguration in its blog domain that was allowing its files to be indexed.

Source: Santander, one of the biggest European banks, was leaking sensitive data on their website

A Santander Consumer spokesperson said:

“The incident highlighted relates specifically to the Santander Consumer Bank Belgium blog only. The blog contains only public information and articles, and therefore no customer data or critical information from the blog  has been compromised. Our security team has already fixed the issue to ensure the blog is secure.”

What exactly is wrong with the Santander website?

When we visited the Santander blog on its Belgian domain, we noticed that the www endpoint of the blog subdomain had a misconfiguration that allowed all of its files to be indexed by search engines

Included in these indexed files was an important info.json file that seemed to contain its Cloudfront API keys.

Download a CyberAware Cheat Sheet

 


May 17 2020

CISO Recruitment: What Are the Hot Skills?

Category: CISODISC @ 11:52 am

CISO/vCISO Recruitment

What are enterprises seeking in their next CISO – a technologist, a business leader or both? Joyce Brocaglia of Alta Associates shares insights on the key qualities

What kinds of CISOs are being replaced? Brocaglia says that an inability to scale and a tactical rather than strategic orientation toward their role are two reasons companies are looking to replace the leaders of their security teams—or place them underneath a more senior cybersecurity executive. They are looking for professionals with broad leadership skills rather than a “one-trick pony.”

Today’s organizations want the CISO to be intimately involved as a strategic partner in digital transformation initiatives being undertaken. This means that their technical expertise must be broader than just cybersecurity, and they must have an understanding of how technology impacts the business—for the better and for the worse. And candidates must be able to explain the company’s security posture to the board and C-suite in language they understand—and make recommendations that reflect an understanding of strategic risk management.

CISOs who came up through the cybersecurity ranks are sometimes at a disadvantage as the CISO role becomes more prominent—and critical to the business. Professionals in this position will do well to broaden their leadership skills and credentials, sooner rather than later.

Source: CISO Recruitment: What Are the Hot Skills?



Interview with Joyce Brocaglia, CEO, Alta Associates



The Benefits of a vCISO
httpv://www.youtube.com/watch?v=jQsG-65wxyU



Want know more about vCISO as a Service…






Subscribe to DISC InfoSec blog by Email

Tags: CISO, vCISO


May 02 2020

10 Steps to Cyber Security

Category: cyber securityDISC @ 12:17 am

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/05/10-Steps-to-Cyber-Security.pdf” title=”10 Steps to Cyber Security”]

10 Steps to Cyber Security pdf


Free Download Cybersecurity For Dummies Cheat Sheet

10 steps to improve your online security and stop hackers
httpv://www.youtube.com/watch?v=H3XpuDN4Tsc

10 Steps To Becoming An Elite Cyber Security Pro Hacker
httpv://www.youtube.com/watch?v=YbUFjeHeY6A

Full Ethical Hacking Course – Network Penetration Testing for Beginners
httpv://www.youtube.com/watch?v=3Kq1MIfTWCE

Subscribe to DISC InfoSec blog by Email


Apr 27 2020

Cyber Security Planning Guide

Category: cyber securityDISC @ 11:54 am

Cyber Security Planning Guide

Open a PDF file The best practice guide for an effective infoSec function.



Guide to Developing a Cybersecurity Strategy & Roadmap
httpv://www.youtube.com/watch?v=TGPHB2wq-IQ






Subscribe to DISC InfoSec blog by Email


Apr 26 2020

Blue Team Cheat Sheets

Category: Blue team,Cheat Sheet,cyber security,HackingDISC @ 3:47 pm

Cyber Security Fundamentals: What is a Blue team?

Open a PDF file The best practice guide for an effective infoSec function.

Blue Team Cheat Sheets

Subscribe to DISC InfoSec blog by Email

Tags: Blue team, Red team


Apr 26 2020

CyberSecurity for Dummies

Category: cyber security,Information SecurityDISC @ 12:22 am

CyberSecurity for Dummies

Open a PDF file The best practice guide for an effective infoSec function.

 
Introduction to Cybersecurity
httpv://www.youtube.com/watch?v=ULGILG-ZhO0

What You Should Learn Before Cybersecurity




Subscribe to DISC InfoSec blog by Email





Apr 25 2020

Preparing a Secure Evolution to 5G

Category: cyber security,Information Security,Wi-Fi SecurityDISC @ 12:23 pm

5G CYBERSECURITY

Preparing a Secure Evolution to 5G

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/04/5G-CYBERSECURITY.pdf” title=”5G CYBERSECURITY”]



Tech Talk: 5G Security
httpv://www.youtube.com/watch?v=7ETDxh2d2sU

Security of 5G networks: EU Member States complete national risk assessments
httpv://www.youtube.com/watch?v=O_Jt9wp9FDc

Bye bye privacy with 5G
httpv://www.youtube.com/watch?v=a0359OG6CyY




Subscribe to DISC InfoSec blog by Email




Tags: 5G privacy, 5G security


Apr 20 2020

Q3 2019 Top-Clicked Phishing Email Subjects from KnowBe4 [INFOGRAPHIC]

Category: PhishingDISC @ 11:16 am

Q3 2019 Top-Clicked Phishing Email Subjects from KnowBe4. Users continue to fall for LinkedIn, Facebook, and security-minded messages. See the full report!

Source: Q3 2019 Top-Clicked Phishing Email Subjects from KnowBe4 [INFOGRAPHIC]

This is what happens when you reply to spam email | James Veitch
httpv://www.youtube.com/watch?v=_QdPW8JrYzQ

How to Spot a Phishing Email I Fortune
httpv://www.youtube.com/watch?v=jfnA7UmlZkE


Anatomy of Scam Emails – How To Recognise A Phishing Scam Message
httpv://www.youtube.com/watch?v=3gpOM9c6mmA




Subscribe to DISC InfoSec blog by Email





Apr 14 2020

ISO 31000 and ISO 22301 available now for free to read

Category: ISO 27kDISC @ 4:14 pm

Because of the COVID-19 crisis, ISO enabled free access to ISO 22301, ISO 22395, ISO 22320, ISO 22316, and ISO 31000 standards – find the links here.

Source: ISO 31000 and ISO 22301 available now for free to read

ISO standards:

 

Subscribe to DISC InfoSec blog by Email





Apr 14 2020

Comprehensive open source free tools list

Category: Information SecurityDISC @ 10:34 am

SANS Faculty has a comprehensive open source free tools available to support your information security career, training and research.

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/04/SANS-Free-tool-list.pdf” title=”SANS Free tool list”]

to download pdf for open source free tools list



Open Source Tools For Working Remotely From Home: pfsense, OpenVPN, Syncthing, and Nextcloud
httpv://www.youtube.com/watch?v=UHzAke2oyfo




Subscribe to DISC InfoSec blog by Email





Apr 03 2020

Coronavirus Business Continuity Management Bundle

Category: BCPDISC @ 4:00 pm

#Coronavirus Business Continuity Management (#BCM) Bundle

Ensure your organisation can survive in the face of disaster; learn how to create and implement an effective business continuity plan.

#Coronavirus Business Continuity Management (#BCM) Bundle

Webinar: Business Continuity Management: Impact Analysis and Risk Assessment
httpv://www.youtube.com/watch?v=awLn7yZDKXs

Subscribe to DISC InfoSec blog by Email




Tags: BCMS, Business continuity planning, business impact assessment, Pandemic assessment


Mar 25 2020

Threat Simulation Overview and Setup – Active Countermeasures

Category: Cyber Threats,Threat detection,Threat ModelingDISC @ 11:50 am

Intro: No software project is complete without testing. In this blog series, we’ll cover how to test if your Threat Hunting platform can detect common threats.[…]

Source: Threat Simulation Overview and Setup – Active Countermeasures

Why You Need Threat Hunting!
httpv://www.youtube.com/watch?v=sKQHJhd-YWE

Cyber Threat Hunting: Identify and Hunt Down Intruders
httpv://www.youtube.com/watch?v=60pyxA0U9EQ

Real-Time Threat Hunting – SANS Threat Hunting & Incident Response Summit 2017
httpv://www.youtube.com/watch?v=TTbZd0he94U

Detecting Malware Beacons with Zeek and RITA
httpv://www.youtube.com/watch?v=eETUi-AZYgc





Subscribe to DISC InfoSec blog by Email





Feb 21 2020

Hunting For Privilege Escalation in Windows Environment

Category: Windows SecurityDISC @ 10:33 pm


Privilege Escalation FTW
httpv://www.youtube.com/watch?v=yXe4X-AIbps

Windows Privilege Escalation Techniques (Local)
httpv://www.youtube.com/watch?v=PC_iMqiuIRQ

Learn System Hacking E13: Windows 10 Privilege Escalation
httpv://www.youtube.com/watch?v=5Q6vEyLY7kY



Subscribe to DISC InfoSec blog by Email





Jan 29 2020

Tokenization vs. Encryption vs. Aliasing – How to Truly Minimize Compliance Risk

Category: Cryptograghy,Information SecurityDISC @ 10:17 pm

 

https://en.wikipedia.org/wiki/Tokenization_(data_security)

Source: Tokenization vs. Encryption vs. Aliasing – How to Truly Minimize Compliance Risk

The tokenization of things | Matthew Roszak | TEDxSanFrancisco
httpv://www.youtube.com/watch?v=Rto-earGcxg


Subscribe to DISC InfoSec blog by Email





Jan 19 2020

NIST Releases Version 1.0 of Privacy Framework

Category: NIST PrivacyDISC @ 11:08 pm

Source: NIST Releases Version 1.0 of Privacy Framework

Tool will help optimize beneficial uses of data while protecting individual privacy

The best practice guide for an effective privacy function

Practice Guide

Open a PDF file NIST Releases Version 1.0 of Privacy Framework

Developing the NIST Privacy Framework – Part 1
httpv://www.youtube.com/watch?v=W-snx9jRFf4

Developing the NIST Privacy Framework – Part 2
httpv://www.youtube.com/watch?v=gZ7ED0t09zk

Developing the NIST Privacy Framework – Part 3
httpv://www.youtube.com/watch?v=x6lTHu1VbiM



Subscribe to DISC InfoSec blog by Email





Jan 03 2020

The Cybersecurity Guide For Leaders in Today’s Digital World

Category: cyber securityDISC @ 10:55 am

The Cybersecurity Guide For Leaders in Today’s Digital World – World Economic Forum

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/01/WEF_Cybersecurity_Guide_for_Leaders.pdf”]


The best practice guide for an effective infoSec function

Practice Guide

Open a PDF file The Cybersecurity Guide For Leaders in Today’s Digital World.




Annual Meeting on Cybersecurity 2019 | Enabling Leadership for a Secure Digital Future | World Economic Forum


Cybersecurity in a Digital World. The Future is Bright
httpv://www.youtube.com/watch?v=Tu1dkliqpHQ






Subscribe to DISC InfoSec blog by Email





Dec 30 2019

Threat Modeling for Data Protection

Category: Threat ModelingDISC @ 10:52 pm

 

Threat Modeling for Data Protection

When evaluating the security of an application and data model ask the questions:

  • What is the sensitivity of the data?
  • What are the regulatory, compliance, or privacy requirements for the data?
  • What is the attack vector that a data owner is hoping to mitigate?
  • What is the overall security posture of the environment, is it a hostile environment or a relatively trusted one?

Data When threat modeling, consider the following common scenarios:

Source: Threat Modeling for Data Protection



Threat Modeling in 2019
httpv://www.youtube.com/watch?v=ZoxHIpzaZ6U






Subscribe to DISC InfoSec blog by Email





Dec 19 2019

ISO/IEC 27701 2019 Standard and Toolkit

Category: GDPR,Information Privacy,ISO 27kDISC @ 12:35 pm

ISO/IEC 27701 is the international standard that serves as an extension to an ISO 27001/ ISO 27002 #ISMS (information security management system). It provides guidelines for implementing, maintaining, and continually improving a #PIMS (privacy information management system).

Develop a privacy information management system as an extension to your ISO 27001-conformant ISMS with ISO/IEC 27701. Supports GDPR compliance.

SECURITY TECHNIQUES — EXTENSION TO ISO/IEC 27001 AND ISO/IEC 27002 FOR PRIVACY INFORMATION MANAGEMENT SYSTEM #PIMS

Key features:

* The Standard includes mapping to the GDPR, ISO/IEC 29100, ISO/IEC 27018, and ISO/IEC 29151
* Integrates with other management system standards, including the information security standard, ISO/IEC 27001
* Provides PIMS-specific guidance for ISO/IEC 27002
* Specifies requirements and provides guidance for establishing, implementing, maintaining, and continually improving a PIMS
* Supports compliance with the GDPR and DPA 2018
* Provides guidance for data controllers and processors responsible for processing personal data


ISO 27701 Gap Analysis Tool


Achieve full compliance with ISO 27701:2019
The ISO 27701 Gap Analysis Tool has been created to help organizations identify whether they are meeting the requirements of the Standard and where they are falling short. Note that this tool assumes that you have a complete and functioning ISO 27001:2013 ISMS (information security management system).

It helps organizations prioritise work areas in order to expand an existing ISMS to take account of privacy. It also gives organizations direction, helping project managers identify where to start.


What does the tool do?

  • Contains a set of sample audit questions
  • Lists all ISO 27701:2019 requirements, identifying where documentation is mandatory for compliance
  • Provides a clear, colour-coded report on the state of compliance
  • The executive summary displays the results of compliance in a clear table so that you can report on your results and measure the closure of gaps.

  • The tool is designed to work in any Microsoft environment. It does not need to be installed like software, and it does not depend on complex databases; it relies on human involvement.



    ISO 27701 The New Privacy Extension for ISO 27001
    httpv://www.youtube.com/watch?v=-NUfTDXlv30

    Quick Guide to ISO/IEC 27701 – The Newest Privacy Information Standard
    httpv://www.youtube.com/watch?v=ilw4UmMSlU4

    General Data Protection Regulation (GDPR) | The California Consumer Privacy Act (CCPA)

    Subscribe to DISC InfoSec blog by Email




    Tags: CCPA, gdpr, iso 27001, iso 27002, ISO 27701, ISO27701, PIMS


    Dec 15 2019

    Global Threat Detection Report

    Category: Cyber Threats,Threat detectionDISC @ 1:22 pm



    2019 Global Threat Detection Report

    2019 Global Threat Detection Report

    via CrowdStrike





    The best practice guide for an effective infoSec function

    Practice Guide

    Open a PDF file 2019 Global Threat Detection Report.




    2019 Global Threat Report- The 1-10-60 Rule
    httpv://www.youtube.com/watch?v=y70R2vUbvls

    World Economic Forum Global Risks Report 2019
    httpv://www.youtube.com/watch?v=kwQMsBWd-jo


    “Threat Detection & Prevention” appliances




    Subscribe to DISC InfoSec blog by Email





    « Previous PageNext Page »