Blue Team

!blueteam

@infosec.pub
Create post
Join BusKill @ DEF CON 32, presenting "Open Hardware Dead Man Switches"

Join BusKill @ DEF CON 32, presenting "Open Hardware Dead Man Switches"

Open link in next tab

BusKill goes to DEF CON 32 - BusKill

https://www.buskill.in/defcon32/

Join BusKill at DEF CON 32 for our presentation titled "Open Hardware Design for BusKill Cord" in the Demo Lab

BusKill goes to DEF CON 32 - BusKill
Security Control Frameworks

Security Control Frameworks

I'm not a vendor, I'm just curious what experience people have with implementing security control frameworks?

DOD uses DISA STIGs. Else uses CIS benchmarks, or self developed based of NIST CSF?

To what degree is your organization using any of these?

Are they enforced? Monitored?

Using any vendor solutions that don't suck?

Does anyone care except you (hopefully 😉)

Vulnerability Assessments

Vulnerability Assessments

I'm curious what tools, SaaS, or other solutions are being used for vulnerability assessments?

DOD calls it ACAS, which is just an acronym for required assessment program of record they currently fullfil with Nessus scanner and related vender solutions.

Anyone have Nessus experience that can compare to another vendor? Good, bad, etc?

Edge history forensics – part 2 (downloads and search)

Edge history forensics – part 2 (downloads and search)

Open link in next tab

Edge history forensics – part 2 (downloads and search)

https://safecontrols.blog/2023/10/19/edge-history-forensics-part-2-downloads-and-search/

What can the History database of Edge reveal about downloads and searches?

Edge history forensics – part 2 (downloads and search)
ALFA: Automated Audit Log Forensic Analysis for Google Workspace

ALFA: Automated Audit Log Forensic Analysis for Google Workspace

Open link in next tab

GitHub - invictus-ir/ALFA: ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit logs and to perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework

https://github.com/invictus-ir/ALFA

ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit logs and to perform automated forensic analysis on the audit ...

GitHub - invictus-ir/ALFA: ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit logs and to perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework
Hacktivists with exaggerated claims again?

Hacktivists with exaggerated claims again?

Open link in next tab

Microsoft denies data breach, theft of 30 million customer accounts

https://www.bleepingcomputer.com/news/security/microsoft-denies-data-breach-theft-of-30-million-customer-accounts/

Microsoft has denied the claims of the so-called hacktivists "Anonymous Sudan" that they breached the company's servers and stole credentials for 30 million customer accounts.

Microsoft denies data breach, theft of 30 million customer accounts
ISO27001/27002 - Am I missing something?

ISO27001/27002 - Am I missing something?

TL;DR: Is ISO27001 easy or am I just too dumb to see the complexity?

Hi!

Just wanted to start some conversation on a standard that's sorta kinda infamous where I'm currently at, the ISO27001 standard.

I got tasked with "polishing up an ISMS" for a company and while I can't go into details, I got basically a control name (from 27002:2022) and a description of "what we need it to do." Now that I got into it, I feel that I may be missing something. Most of their controls are "Limit access to server room" or "Make sure access is logged and not permanent."

Like, the standard is not difficult reading, but if they can explain to ME how the controls should look in the end, what am I missing? Is there some extremely difficult part? Or can I just say "Just make the creds timeout after a month. Source: dude trust me?"

If you were tasked with implementing ISO27001, did you encounter any specific hurdles that I may not see from where I'm standing? The only thing I can see after I got through all the controls was a feeling that this will be more expensive on time for the security teams.

Thank you for coming to my TED(x) talk.

Excel as log analysis tool?

Excel as log analysis tool?

Open link in next tab

Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft Excel | Mandiant

https://www.mandiant.com/resources/blog/tips-and-tricks-to-analyze-data-with-microsoft-excel

Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft Excel | Mandiant
Modern Attack Methods You Should Know

Modern Attack Methods You Should Know

Open link in next tab

archive.ph

https://archive.ph/L8kQ1

Container security fundamentals series

Container security fundamentals series

Open link in next tab

Container security fundamentals: Exploring containers as processes | Datadog Security Labs

https://securitylabs.datadoghq.com/articles/container-security-fundamentals-part-1/

A look at how containers work as Linux processes and what that means for security.

Container security fundamentals: Exploring containers as processes |  Datadog Security Labs