Posts Tagged ‘Vulnerability’

Acunetix Web Vulnerability Scanner v9.5.x

Officially known as CVE-2014-6271, this vulnerability, cordially termed ShellShock, has been assigned the highest CVSS score of 10, a score that the notorious HeartBleed did not achieve. The high score is more than warranted. The vulnerability is very easy to exploit allowing pretty much every script kiddie to take control of a vulnerable server and execute arbitrary code.

Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell. The first disclosed on the vulnerability on 24 September 2014. Many Internet daemons and services, such as web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bah to execute arbitrary commands such as to gain unauthorised access to a computer system.

Acunetix has already been updated to identify web servers vulnerable to ShellShock. The next time you start Acunetix WVS latest version, you will be prompted to install an update, which includes detection of ShellShock.

For interest to know more about how it impact on business infrastructure, and how the E-SPIN carry solutions can help to resolve the case, please feel free to contact E-SPIN officers across the region.


Read Full Post »

Saint’s Security Suite aims to bring the Next Generation of Vulnerability Management to enterprises in an easy to use package with a plethora of integrated tools bundled in a friendly interface all of which allows for a dynamic control of data presentation.

Saint’s suite provides six core tools all with a specialized purpose to help protect business operations, mitigate risks, simplify compliance, and improve IT management.

Vulnerability Scanning
Saint’s easy to use vulnerability scanner allows users to target any IPv4/IPv6/URL for vulnerabilities backed by a daily updated list of vulnerability checks and exploits. It also allows for scanning of operating system, web application and database applications to verify patch compliance, antivirus status, and any sensitive information (credit card numbers or social security numbers)

Penetration Testing
Allows for enterprises to test their systems using vulnerability exploits to gain remote access to discover any existing vulnerabilities (Application, SQL, PHP, and XSS exploits). The Pen. Test tool allows enterprises to simulate social engineering attacks through phishing assessments and e-mail forgery.

blog_saint_1Configuration Auditing
A dedicated Security Content Automation Protocol module which supports focused scanning analysis and CyberScope reporting. Designed to help display compliance with various policies (FDCC, USGCB) defined by the NIST. It comes built in with a policy editor which allows enterprises to develop customized security policies benchmarked against NIST standards.

Drill Down Dashboards & Analytic
All of Saint’s dashboards allow for users to delve deeper into data provided to get a detailed view of the information provided. Allowing for users to select multiple results to perform batch analysis. All data can be dynamically sorted, searched, and ordered to make the most sense to you.

blog_saint_2Compliance & Custom Reporting
The report wizard is able to generate customized reports with over 150 options including charts. Users can generate trend reports using previously gathered data and present data to get a better idea of how the landscape has or is changing. The wizard supports compliance report generation including some of the following:

  • PCI
  • SOX

Role Based Security (RBS)
IT Systems are most prone to risk when the users of the system gets complacent and/or makes a mistake. Case in point would be the RSA breach in 2011 where an employee mistakenly opened a malicious attachment leading to mass data theft. Saint seeks to solve that with RBS, which allows for tight control of all user permissions and activity. On top of that its scanner is able to be assigned asset groups which contain predefined list of associated targets.
These tools enable Saint to perform as a one stop solution for enterprise Vulnerability Management, but they are by no means limited to just that. Included are tools for asset management, access control, API for integration support (ease of integration with third party tools), and as enterprises are always growing; Saint has made the Suite easily scalable to match.


Read Full Post »

A proactive approach to SIEM

As the old adage goes “the best defense is a strong offense”, McAfee Risk Advisor seeks to replicate that through a proactive approach to risk management. With the goal to reduce the grab in the dark approach organizations take to procuring and deploying security measures, Risk Advisor pinpoints critical assets which require immediate attention. Leveraging McAfee Lab’s ability to gather threat data from millions of collection points, it is kept up to date with thread analysis and any potential remedies.

Risk Advisor has an inbuilt scoring system which quantifies an organization’s risk mitigation efforts. It uses the vulnerability and threat status, criticality of an asset, and any pre-existing countermeasures to generate a current risk score. This allows managers to look at what effect their risk mitigation efforts has had on their asset.


Risk Advisor is designed to work out of box with a multitude of other McAfee products such as McAfee’s Virus Scanner, Host Intrusion Prevention, Vulnerability Manager, Policy Auditor and Network Security Manager to provide countermeasure information across various functions. It has even been integrated into non-McAfee products such as SAP BusinessObjects to extend its risk analysis to business decisions.


Read Full Post »

vulnerabilities threats model

Today’s high-tech network security appliances ensure a great job of keeping the vulnerabilities threats from invading your business. These vulnerabilities threats can increase the level of vulnerabilities and penetrates to your host system and network assets to obtain the confidential info and utilized illegally for their own benefits.

Where do these vulnerabilities generated from?

  1. USB thumb drives – The ubiquity of thumb drives hackers to develop targeted malware, such as the notorious Conficker worm, that can automatically execute upon connecting with a live USB port
  2. Hardware, Laptop and netbooks – With a handy Ethernet port for tapping directly into a network, a laptop may already have malicious code running in the background which is tasked to scour the network and find additional systems to infect.
  3. Wireless access points – Wireless APs provide immediate connectivity to any user within proximity of the network and are naturally insecure, regardless if encryption is used or not. Protocols such as wireless encryption protocol contain known vulnerabilities that are easily compromised with attack frameworks, such as Aircrack
  4. Smartphones and other digital devices – Phones are full-functioning computers, complete with Wi-Fi connectivity, multithreaded operating systems, high storage capacity, high-resolution cameras and vast application support. However, these devices also have the potential to elude traditional data-leak prevention solutions.
  5. E-mail – An electronic mail carries the messages with confidential information that can easily be forwarded to any external target which the e-mails themselves can carry nasty viruses in targeted e-mail via phishing for access credentials from an employee. These stolen credentials would then be leveraged in a second-stage attack.

What can I do to combat with these vulnerabilities threats?

To combats these harmful, dangerous, potential vulnerabilities threats, E-SPIN’s offer a comprehensive portfolio of Vulnerability Management, Risk Assessment and Compliance Assurance Solutions (http://www.e-spincorp.com/espinv3/index.php/solutions) to automate the process of vulnerability management and policy compliance across the enterprise to keep your host system and network assets safe and secure from these vulnerabilities threats by:

  • Providing network and network security device to secured laptops, netbooks or any digital devices, USB devices
  • Server and system, OS, web application
  • Database and wireless access point
  • Mobile device discovery for smart phones and other digital devices.
  • Mapping, asset prioritization, vulnerability assessment reporting and remediation tracking accordingly to business risk
  • Policy compliance allows auditing, enforcing and documenting compliance with internal security policies and external regulations.

What are E-SPIN’s Solutions offers and specialties?

  • Vulnerability Management, Vulnerability Assessment, Security Audit, Penetration Testing, Network Assessment, Network Device Audit, Web Application Audit, Database Security Audit, Wireless Network Assessment, Mobile Device Security Audit, Exploitation Management and Testing, Vulnerability Reporting
  • Automating Vulnerability Management, Enforcing IT Policy Compliance, in deep and comprehensive reporting, best of breed industry de factor solutions, maintaining regulatory compliance, Automated and Advanced Exploitation Testing.

Read Full Post »