LRQA Nettitude Blog

What is the Log4Shell Vulnerability and how can you protect against it?

Posted by Nettitude on Dec 13, 2021
What is the Log4Shell Vulnerability?

Log4j is a logging library written in Java and the vulnerability, CVE-2021-44228, also commonly known as Log4Shell, allows a remote actor to send a crafted HTTP packet to servers or other software suite exposed to the internet, running the version below Log4j 2.15.0.

Read More

Topics: Log4Shell

CMMC 2.0: It’s not an admission of defeat, but a tactical retreat | LRQA Nettitude

Posted by Joe Donohue on Dec 9, 2021

If your organization has been preparing for CMMC certification, the news that the Department of Defense has issued CMMC 2.0 and cast aside the CMMC 1.0 model (and timelines) may have been greeted with a mix of dismay and relief. The dismay is due to all the effort already put into meeting CMMC requirements. The feeling of relief may be along the lines of “Thank goodness we don’t have that to worry about any longer.” I have separate responses to each of these sentiments.

Read More

Topics: CMMC

Bug Bounty vs Pen Testing - What's the Difference? | Nettitude

Posted by Chris Oakley on Nov 30, 2021

When specifying cybersecurity testing for your organisation you’ll come across various approaches. Penetration testing and bug bounty programmes are two likely options.

But is this an either-or situation? We highlight the main differences between bug bounty and penetration testing and explain why they actually complement each other, keeping your organisation as safe as possible, 365 days a year.

Read More

Topics: Penetration Testing, Bug Bounty

What Is Ransomware & How Does It Work? | Nettitude

Posted by Jenny Wu on Nov 19, 2021
What is ransomware?

Ransomware is a type of malware that locks and encrypts your computer or device before demanding a ransom to restore access.

Your files and data are effectively held hostage. They’re inaccessible until you pay the attacker to unlock them, or you remove the ransomware from your system.

Of course, the best scenario is to prevent an attack in the first place. It saves immense stress to your people and lost productivity due to inevitable downtime. Not to mention the financial blow, should you choose to pay.

There have been several notable attacks during 2021. Darkside targeted larger organisations such as Colonial Pipeline in the USA. Meanwhile, Revil and Sodinokibi were blamed for a cyberattack on JBS, the world’s largest meat packer.

But it’s not just a problem for large corporates. Any sized business in any country can suffer a ransomware attack.



Read More

Topics: ransomware, incident response, malware

5 Benefits of Bug Bounty Programs | Nettitude

Posted by Chris Oakley on Oct 22, 2021

Cybersecurity testing takes many forms - each one with different benefits. Bug bounty programs will be new to many organisations. Yet, combined with fixed timeframe testing, they provide greater security assurance on a continual basis – not just at a single point in time.

This article unpacks five key benefits of a Bug Bounty program and the difference it can make to your cybersecurity, week in, week out.

Read More

Topics: Bug Bounty

Should you choose a local or global TIBER test provider?

Posted by Anthony Long on Oct 1, 2021

Finding the right TIBER test provider for your organisation is crucial. You’ll want a secure test, but there’s huge value in knowing how to act on the results to protect your operations. An obvious question exists: should you opt for a local provider in your country or choose a larger, global tester?

We consider both options to help you make an informed choice.

Should you choose a local or global TIBER test provider

Read More

Topics: Financial Services, TIBER

What is a Bug Bounty?

Posted by Chris Oakley on Sep 14, 2021

Cybersecurity testing is more crucial than ever. Whilst you’re probably familiar with our penetration testing services, you might not know about our bug bounty platform. And yet, it’s incredibly valuable to maximise your security.

Read More

Topics: Penetration Testing, Bug Bounty

Process Hiving - Red Teaming Whitepaper

Posted by Rob Bone and Ben Turner on Sep 2, 2021

Our red team has created a new technique, and accompanying tool, that allows a red team operator to avoid many of the usual indicators that can trigger detection alerts when using existing tools. Avoiding detection is a high priority for a red team operator because this usually signals the imminent end of the compromise, as the network defenders start to contain and eradicate the threat.

Read More

Topics: Red Teaming, Process Hiving

Why you never pass or fail a TIBER test

Posted by Nettitude on Aug 26, 2021

It’s impossible to totally eliminate the risk of a cyberattack. No reputable cybersecurity company could give that assurance. For the same reason, you cannot simply pass or fail a TIBER test.


In fact, it would pose a higher risk to state you’d passed as you might take no further action.


Complacency in cybersecurity is risky.

Protecting your organisation from cyberattacks should be continual. And it must be specific to your risk profile and particular operations. As attacks become more sophisticated, so must your testing to keep one step ahead.

 

Read More

Topics: Financial Services, TIBER

How JWT Hijacking Can Be Prevented | LRQA Nettitude

Posted by Nettitude on Apr 16, 2021

By Vanessa Santos | Security Consultant at LRQA Nettitude

Json Web Tokens (JWTs) are commonly used in many applications to validate the client’s identity. The JWT token is provided during authentication in case of success and this is then used in all authenticated interactions to the application.

The validation of user’s identity is based on the user’s information stored in the JWT token which is signed by the server using JSON Web Signatures. The information exchanged within the JWT can also be encrypted using JSON Web Encryption however this is not widely used.

Although the JWT token can be used in web applications there is a number of caveats that come with the choice of implementing JWT authentication tokens that can result in them being hijacked.

In this article we will be discussing these security implementation issues and will uncover ways of preventing an attacker from hijacking JWT tokens.

Read More

Topics: Cyber Security, Nettitude, Security Blog, JSON Web Token

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all