Detecting and bypassing anti-Adversary-in-the-Middle (AitM) tokens
Within the Advanced Red Teaming (ART) framework it is possible to skip the initial compromise phase of a red team engagement and start from a “Assumed Compromise” scenario. However phishing attacks are commonly used to breach the perimeter. In this blog, we will discuss a specific detection method for Adversary-in-the-Middle attacks (AitM) commonly used by adversaries such as ransomware groups to gain access to the organization’s data. Then we explore how this method can be bypassed.
What is XXE (XML eXternal Entity) injection?
A lot of modern web applications still use XML for transportation and storage of data. In 1996 the World Wide Web Consortium (W3C) created this standard and to this day, it is used for a wide variety of implementations. XML has many features that developers are not always familiar with, offering hackers an opportunity for abuse.
NIST cybersecurity framework 2.0
In a significant step forward to strengthen cybersecurity at all organisations, the National Institute of Standards and Technology (NIST) recently updated its Cybersecurity Framework to Version 2.0. This update marks the first major revision since the framework was introduced in 2014. It reflects a broader scope and enhanced resources for organisations looking to strengthen their digital resilience.
Building a cyber resilient culture: The rol of Assurance and Advisory Services
In today’s high-stakes business environment, creating a robust cyber resilient culture is less about installing advanced firewalls and more about strategic foresight. For today’s business leaders, the challenge lies not just in responding to threats but in proactively embedding resilience into the organizational fabric. Assurance and advisory services are not just support mechanisms—they are strategic tools that transform cybersecurity from a necessary backend operation into a front-line business advantage.
Download our step-by-step guide to SOC 1 compliance! Find out more about the SOC 1 standard and learn how to prepare the scope of your SOC 1 project, and the project phase of a SOC 1 implementation and audit.
The importance of ISAE 3402 in Real Estate Operation
In the complex realm of real estate, where precision in transactional integrity and the assurance of operational controls are paramount, ISAE 3402 emerges as a pivotal standard. This framework is not merely about meeting compliance requirements but is a decisive tool for real estate companies aiming to showcase their commitment to robust governance and transparent financial practices.
Operational Risk Management: Avoiding common pitfalls and building resilience
Operational Risk Management involves the myriad uncertainties and inefficiencies inherent in the day-to-day activities of a company. These can stem from various sources—system failures, process inefficiencies, human error, or external events. Addressing these risks is pivotal, not merely for compliance or protecting assets, but as an essential strategy for organizational resilience and competitive advantage
Securance & Kiwa: Cybersecurity Solutions
Securance, a leader in integrated risk management and cybersecurity solutions in Europe, is excited to announce a new partnership with Kiwa, an esteemed provider of certification and compliance services. This collaboration will focus on ISO certifications and Assurance services, enhancing our offerings while maintaining our distinct expertise in our respective fields.
Vergemakkelijken van een soepele naleving van ISAE 3402, zodat organisaties effectieve controle kunnen aantonen over uitbestede processen en diensten.
DORA: Making the Financial Sector Stronger
As financial institutions increasingly rely on digital systems, the need for robust operational resilience has never been more critical. The Digital Operational Resilience Act (DORA) is a pioneering regulation aimed at fortifying the financial sector against digital disruptions. This blog explores how DORA enhances the sector’s resilience.