Security Software & Tools Tips – October 2018 October 1, 2018/in IT security, Security blog /by stefan mansbyIn this monthly post we try to make you aware of five different security related products. This is a repost from my personal website Ulyaoth. This month we have chosen the following: * Hiawatha * Shodan * GRR * Cloudfail * AbuseIO Hiawatha Hiawatha is a cool lightweight webserver that has a very easy syntax to configure it. The maker of Hiawatha has written the webserver with security in mind, so it provides out of the box support for stopping SQL injections, XSS and CSRF attacks and exploit attempts. We think Hiawatha is a great secure alternative for Apache or Nginx. From the Hiawatha website: Hiawatha is an open source webserver with a focus on security. I started Hiawatha in January 2002. Before that time, I had used several webservers, but I didn’t like them. They had illogical, almost cryptic configuration syntax and none of them gave me a good feeling about their security and robustness. So, I decided it was time to write my own webserver. I never thought that my webserver would become what it is today, but I enjoyed working on it and liked to have my own open source project. In the years that followed, Hiawatha became a fully functional webserver. Website: https://www.hiawatha-webserver.org/ Shodan Shodan is a website where you can scan internet connected devices for open services. This is a great tool to find out if your organization has any services exposed to the internet that might be a security risk. From wiki: Shodan is a search engine that lets the user find specific types of computers connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client. Website: https://www.shodan.io/ GRR GRR (Rapid Response) framework is a server client software that allows you to do live forensics on remote servers. From their website: GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. Website: https://github.com/google/grr Cloudfail From their website: CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by Cloudflare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. * Misconfigured DNS scan using DNSDumpster. * Scan the Crimeflare database. * Bruteforce scan over 2500 subdomains. Website: https://github.com/m0rtem/CloudFail AbuseIO This piece of software gives you a web interface that imports most important feeds such as shadowserver and spamcop, you can then see this information in a easy and relevant way. This is a great tool to automate and improve the abuse handling process. From their website: It is a toolkit anyone can use to receive, process, correlate abuse reports and send notifications with specific information regarding the abuse case(s) on your network. AbuseIO’s purpose is to consolidate efforts by various companies and individuals to automate and improve the abuse handling process. Website: https://abuse.io/download/ Photo by Liam Tucker on Unsplash https://basefarm.nl/wp-content/uploads/2018/03/aws.jpeg 1667 2500 stefan mansby /wp-content/uploads/2018/04/Basefarm-PERFECTLY-BALANCED-CLOUD-SOLUTIONS-neg-2.png stefan mansby2018-10-01 14:49:062018-10-05 10:42:22Security Software & Tools Tips – October 2018
5 tips for better cloud security September 14, 2018/in IT security, Security blog /by trond hagenThis blog post is a summary of this weeks Information Security News put together by our Security Incident Response Team (SIRT). Read more https://basefarm.nl/wp-content/uploads/2018/10/internet-3629639-1030x687.jpg 687 1030 trond hagen /wp-content/uploads/2018/04/Basefarm-PERFECTLY-BALANCED-CLOUD-SOLUTIONS-neg-2.png trond hagen2018-09-14 11:55:382018-10-05 10:43:225 tips for better cloud security
Security is Not a One-Person Job August 24, 2018/in IT security, Security blog /by stefan mansbySecurity is not a one-person job. It can’t be accomplished with one person, it can’t be accomplished with one company. “Security is not a one-person job. It can’t be accomplished with one person, it can’t be accomplished with one company,” says Walls. “So we need partners, and we need friends in the industry to work together.” No statement could better summarize what building a culture of security looks like. Learn more about how Walls and Prime Therapeutics implemented DLP to protect highly sensitive data for millions of people. Read more.. Top 5 Security links New Apache Struts Vulnerability Leaves Major Websites Exposed Vulnerability in OpenSSH “for two decades” (no, the sky isn’t falling!) Intel rips up microcode security fix license that banned benchmarking $1.1M is Lost to Cybercrime Every Minute of Every Day Evolution of Android Security Updates https://basefarm.nl/wp-content/uploads/2018/10/achievement-agreement-arms-1068523-1030x674.jpg 674 1030 stefan mansby /wp-content/uploads/2018/04/Basefarm-PERFECTLY-BALANCED-CLOUD-SOLUTIONS-neg-2.png stefan mansby2018-08-24 10:14:072018-10-05 10:46:16Security is Not a One-Person Job
Malware is so 2017: five new security trends to watch out for March 23, 2018/in Security blog /by basefarmOutbreaks such as Petya and WannaCry really put the malware threat on the IT agenda and made cybersecurity a priority for everyone. Fredrik Svantes, Senior Information Security Manager at Basefarm, explains the latest developments that keep the cybersecurity community busy. Read more https://basefarm.nl/wp-content/uploads/2018/02/wannacry.jpeg 1786 2500 basefarm /wp-content/uploads/2018/04/Basefarm-PERFECTLY-BALANCED-CLOUD-SOLUTIONS-neg-2.png basefarm2018-03-23 12:45:232018-08-21 13:29:00Malware is so 2017: five new security trends to watch out for