Author: UnveiledSec
-
External Attack Surface Management and its Integration with Cybersecurity Operations
Original Post Date: February 10, 2023 Recent news reminds us that vulnerabilities persist in critical infrastructure platforms targeted by financially motivated and state-sponsored espionage threat actors. We’re constantly hearing about the exploitation of old and new vulnerabilities as part of cyberattacks. While vulnerability management may be challenging, we must be vigilant and look for ways…
-
Rethinking Cyber Threat Intelligence
By Justin C. Klein Keane Original Publish Date: February 3, 2023 The promise of cyber threat intelligence (CTI) was always that, as a global community, blue teams could share information about badness that happened instantaneously and proactively utilize indicators of attack (IOAs) or compromise (IOCs) observed by others. IOAs and IOCs are known as tactical…
-
The Assault on Microsoft Exchange Server
Originally posted on Jan. 2, 2023 Microsoft products have been a favorite target of threat actors since the creation of computer viruses such as Brain and Morris in 1986 and 1988, respectively. Microsoft Exchange Server is an attractive target for threat actors trying to gain access to corporate networks to perform discovery operations and to deploy malware, including ransomware. Over the past two years, multiple sources have…