I recently read about Aquatone on Twitter from this tweet: HTML reports generated by Aquatone are been broken due to Subresource Integrity failure on a CSS resource. Version 1.4.3 fixes this problem: https://t.co/eb9Z1LTIZw— Michael Henriksen (@michenriksen) January 5, 2019 Aquatone is a little tool that I have been playing around with the past couple of … Continue reading Fingerprinting with Aquatone
Vulnerability Management Fatigue
CVEDetails says that there is currently over 14,000 vulnerabilities that have a CVE score of 9.0 or higher. The average CVE score is a 6.6, and the total number of CVE's is over 103,000. You are responsible for every single one of them. If you're a small shop, that is in addition to your monitoring … Continue reading Vulnerability Management Fatigue
Demisto Playbooks
I have been doing a lot of work on playbook design and automation recently, and stumbled upon some really great work by Demisto, a security automation platform. I haven't been able to experiment with the product, so can't say how good I feel it is. The playbook blog they run, though, is very helpful! For … Continue reading Demisto Playbooks
Incident Readiness
An incident response plan is the cornerstone to preparing for what is coming: an incident (a bit obvious, really). Incidents are those little things that tear businesses up. At it's core, the Equifax breach was an incident. The Yahoo email scandal was... an incident. The Shadow Broker's 'hack': an incident. Your data center just went … Continue reading Incident Readiness
Asset Management
Is hard. That's it. Asset management is hard. Fucking hard is probably a more apt term. I have been brainstorming a better way to do this, but there really isn't one. Every day new assets appear on the network: laptops, phones, tablets, smart crap, etc, etc. Here at RSA I have heard many vendors try … Continue reading Asset Management