Safeguarding Organisations: Understanding and Preventing Spoofing

The blog discusses the threat of spoofing and phishing in the digital landscape, emphasizing the significance of these cyber threats. It highlights the increasing trend of attackers targeting personal identifiable information. The blog explains that all spoofing attacks essentially break one’s identity, exposing the need for vigilance. A key defense strategy mentioned includes continuous monitoring of user behaviour even in remote work environments. The blog suggests the employment of efficient systems that deploy solutions like UEBA and EPP. The use of multi-factor authentication is proposed as a more secure alternative to two-factor authentication. It also introduces advanced authentication methods such as time-bound tokens and Yubikey. The post ends by stating that awareness and education are vital tools against cyber threats, with an increasing number of governments and organizations launching educational campaigns about identity theft.

October 18, 2023
Kiran Vangaveti

Safeguarding Organisations: Understanding and Preventing Spoofing

The blog discusses the threat of spoofing and phishing in the digital landscape, emphasizing the significance of these cyber threats. It highlights the increasing trend of attackers targeting personal identifiable information. The blog explains that all spoofing attacks essentially break one’s identity, exposing the need for vigilance. A key defense strategy mentioned includes continuous monitoring of user behaviour even in remote work environments. The blog suggests the employment of efficient systems that deploy solutions like UEBA and EPP. The use of multi-factor authentication is proposed as a more secure alternative to two-factor authentication. It also introduces advanced authentication methods such as time-bound tokens and Yubikey. The post ends by stating that awareness and education are vital tools against cyber threats, with an increasing number of governments and organizations launching educational campaigns about identity theft.

October 18, 2023
Kiran Vangaveti

Building, Testing, and Refining Your Incident Response Plan: A Comprehensive Guide

The blog discusses crucial metrics in evaluating an organization's incident response efficacy, including Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), Mean Time to Recover (MTTRw), Incident Resolution Rate, False Positives, and Incident Severity. It also outlines the steps for building an effective incident response plan, which includes defining roles and responsibilities, ensuring visibility, containing incidents, recovery, problem management, and a communication strategy. Testing the plan's effectiveness is equally vital, and methods include simulated exercises, Red Team vs. Blue Team Exercises, Tabletop drills, and continuous monitoring. These practices help refine the response and mitigate cybersecurity threats.

August 30, 2023

Building, Testing, and Refining Your Incident Response Plan: A Comprehensive Guide

The blog discusses crucial metrics in evaluating an organization's incident response efficacy, including Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), Mean Time to Recover (MTTRw), Incident Resolution Rate, False Positives, and Incident Severity. It also outlines the steps for building an effective incident response plan, which includes defining roles and responsibilities, ensuring visibility, containing incidents, recovery, problem management, and a communication strategy. Testing the plan's effectiveness is equally vital, and methods include simulated exercises, Red Team vs. Blue Team Exercises, Tabletop drills, and continuous monitoring. These practices help refine the response and mitigate cybersecurity threats.

August 30, 2023

Effective Communication Strategies between Cybersecurity Professionals and Business Users

This blog post outlines key strategies for effective communication between cybersecurity professionals and business users. The emphasis is on simplifying complex concepts, aligning security measures with business objectives, and fostering a secure working environment. It recommends strategies such as using real-world analogies, understanding business goals, conducting regular training and awareness sessions, and tailoring communication based on the audience's technical expertise. Other suggestions include appointing a Cyber Champion to facilitate communication, involving business users in risk assessments, and maintaining open channels for updates and guidance. These practices aim to improve overall cybersecurity posture and resilience within organizations.

August 23, 2023

Effective Communication Strategies between Cybersecurity Professionals and Business Users

This blog post outlines key strategies for effective communication between cybersecurity professionals and business users. The emphasis is on simplifying complex concepts, aligning security measures with business objectives, and fostering a secure working environment. It recommends strategies such as using real-world analogies, understanding business goals, conducting regular training and awareness sessions, and tailoring communication based on the audience's technical expertise. Other suggestions include appointing a Cyber Champion to facilitate communication, involving business users in risk assessments, and maintaining open channels for updates and guidance. These practices aim to improve overall cybersecurity posture and resilience within organizations.

August 23, 2023

Man in the middle attacks, the YouTube - Tesla Fiasco

Recent events involving the YouTube channel of Tanmay Bhat being hacked have raised the alarm on the potential of hackers targeting popular influencers on social media. The hackers managed to bypass two-factor authentication, exploiting a man-in-the-middle (MiTM) attack where malicious software steals user session cookies. The modus operandi of these hackers often begins with a phishing campaign which redirects users to malware-infected landing sites. In order to combat this trend, influencers must prioritize their cybersecurity strategies, through training on information security and maintaining basic sanity around authentication and login activities. It is also important for government authorities and social media giants to collaborate closely and establish rapid response protocols and regulations.

June 8, 2023
Kiran Vangaveti

Man in the middle attacks, the YouTube - Tesla Fiasco

Recent events involving the YouTube channel of Tanmay Bhat being hacked have raised the alarm on the potential of hackers targeting popular influencers on social media. The hackers managed to bypass two-factor authentication, exploiting a man-in-the-middle (MiTM) attack where malicious software steals user session cookies. The modus operandi of these hackers often begins with a phishing campaign which redirects users to malware-infected landing sites. In order to combat this trend, influencers must prioritize their cybersecurity strategies, through training on information security and maintaining basic sanity around authentication and login activities. It is also important for government authorities and social media giants to collaborate closely and establish rapid response protocols and regulations.

June 8, 2023
Kiran Vangaveti

More like this?

Subscribe to the #CybersecurityAfterHours newsletter to get your monthly roundup of Cybersecurity news and happenings, and curated articles from this blog.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.