Author: Yusuf

Extended detection and response (XDR)

Extended detection and response (XDR) captures threat data from previously isolated security tools throughout the organizations tech stack to enable easier, faster triage and efficacy in investigation, threat hunting, and accurately responding to incident before it gets out of hand. By unifying threat detection data and tools and strengthening capabilities and context to respond quickly

Network Detection and Response – NDR

Organizations are increasingly considering response capabilities within NDR solutions for dealing with threats detected through network traffic analytics tools, which are mostly focused on only detecting threats, and are largely focused around the core variations of known threats. NDR security solutions offer the added layers of network-level protection and threat prevention capabilities organizations mostly need

Log4j Vulnerabilities

Towards the end of November, a researcher from Alibaba discovered a fault (CVE-2021-44228) in a well known open-source logging library called Log4j. The researcher responsibly disclosed his finding to Log4j’s Apache Software Foundation. An additional vulnerability (CVE-2021-45105) was also discovered in a patch released to fix the initial vulnerability. This was then followed with  yet another

Malicious Actor Discloses FortiGate SSL-VPN Credentials

This is a very serious leak as VPN (Virtual Private Network) username and passwords could undoubtedly allow the bad actors to access a network to perform all manner of activities including stealing date (data exfiltration), install hidden malware or perform ransomware attacks to extort money. Although the exploit relates to an already patched loop-whole,  you should

Zero-Click iPhone Exploits

A report from Citizen Lab about two zero iMessage vulnerabilities/exploit which require zero click, in spyware sold by the cyberweapons NSO Group. iMessage is the the default messaging app of Apple iPhone. It appears these attacks do not require victim to do anything. They neither click on a link or open a file. The victim receives