Blog

Defensys releases version 5.0 of its SGRC platform

The Defensys company has released a new version of its platform for automating cyber security management processes – Defensys SGRC 5.0. In this version vendor enhanced compliance, asset and vulnerability management features.

A lot of new regulatory standards strongly affect the system’s development. For instance, SAMA framework that was recently added to the Platform demands new reporting templates and assessment scales. The same thing is with GDPR, UAE IA Regulation framework and some other standards including in-house frameworks from customers that sometimes demand different mathematics to calculate resulting indexes after the audit is completed.

That’s why in Defensys SGRC 5.0 there appeared an “import/export” feature for audit types. The type affects what scale will be used for the assessment, what fields will be available for the filling and how will be statistics calculated. This feature significantly helps to quickly transfer all the needed preferences from the testing segment/installation to the productive server during the specific stage of some implementation project.

Some features appeared in Assets functional block. The vendor enhanced asset data import features. Now users can automatically upload data to the system from the Excel, CSV, JSON, XML files. This extended file extensions support helps to simplify the data transfer process that affects the overall inventory process in good manner.

More

Cybersecurity Digest #53: 27/06/2022 – 08/07/2022

Cybersecurity news

  • Security researchers are warning that hackers can abuse online programming learning platforms to remotely launch cyberattacks, steal data, and scan for vulnerable devices, simply by using a web browser.
  • A newly discovered Linux malware is being used to stealthily steal information from backdoored Linux systems and infect all running processes on the machine. Dubbed OrBit by Intezer Labs security researchers who first spotted it, this malware hijacks shared libraries to intercept function calls by modifying the LD_PRELOAD environment variable on compromised devices.
  • The developer of the AstraLocker ransomware code is reportedly ceasing operations and turning attention to the far simpler art and crime of cryptojacking. The ransomware’s developer submitted a ZIP archive with AstraLocker decryptors to the VirusTotal malware analysis platform.
  • A new ransomware operation called RedAlert, encrypts both Windows and Linux VMWare ESXi servers in attacks on corporate networks. The ransomware has been called ‘RedAlert’ based on a string used in the ransom note. However, from a Linux encryptor, the threat actors call their operation ‘N13V’.
  • The Django project, an open source Python-based web framework has patched a high severity vulnerability in its latest releases.

More

Case study by Defensys – Managed security service provider

Challenge

The Computer Security Incident Response Team of MSSP, was facing a typical for a MSSP challenge of choosing the right SOAR platform for automation of their internal incident management processes.

Key Requirements

While choosing the product the company looked at several criteria with the following key requirements:

  • MSSP-ready product with all necessary functions in place for delivering high-speed incident response service
  • High quality and reliability
  • Minimum resources required for product maintenance
    and support
  • A mature development team and responsive first line
    technical support helping to adapt the product to their
    needs

The managed security service provider team selected 6 SOAR products for initial comparison 4 of which were tested during the pilot projects.

After comparative analysis and testing, the team selected Defensys SOAR platform.

The specifics of the MSSP

The MSSP has 3 Tiers for incident monitoring working 24/7 with separate response and maintenance groups, forensic, threat hunting and other experts. The whole team follows one single integrated workflow that regulates the incident management process and specifies tasks for each team member at certain stage.

More

Indicators of compromise Lifecycle management

Threat Intelligence (TI) platforms work with knowledge about cyber security threats: attacks, attackers, targets, motivations, tools, malware, vulnerabilities and indicators of compromise. This knowledge must be fact-based – verified, timely, and sufficient to make decisions on adequate protection measures.

In a general sense, an Indicator of Compromise (IoC) is a digital artifact that clearly indicates the described object’s potential maliciousness and/or the fact that the information system has been compromised.

In the process of working with TI data, the following indicator types can be used as:

  • IP addresses
  • domains
  • files
  • links
  • hash sums of files
  • email addresses
  • bank cards
  • accounts

The life cycle of an indicator of compromise

Each indicator has its life cycle, i.e. the time during which it preserves its malicious activity with a high probability. Some indicators can be “dangerous” for several days, some – for months. When its lifetime expires, the indicator becomes irrelevant, in other words, it becomes obsolete.

The indicator life cycle starts when a cyber security analyst or some security tools detect the threat. Malicious activity signs, that is, any objects and data associated with a detected threat, indicate that the system has been compromised and are considered indicators of compromise.

More

Cybersecurity Digest #52: 13/06/2022 – 24/06/2022

Cybersecurity news

More