<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BSG Blog</title>
	<atom:link href="https://bsg.tech/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://bsg.tech/blog</link>
	<description>Berezha Security Group</description>
	<lastBuildDate>Tue, 29 Jul 2025 11:42:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://bsg.tech/blog/wp-content/uploads/2021/05/favicon-96x96-1.png</url>
	<title>BSG Blog</title>
	<link>https://bsg.tech/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">193191410</site>	<item>
		<title>Cybersecurity Professional Standards</title>
		<link>https://bsg.tech/blog/cybersecurity-professional-standards/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Tue, 29 Jul 2025 11:41:52 +0000</pubDate>
				<category><![CDATA[Tools & Methods]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14713</guid>

					<description><![CDATA[Discover how unified cybersecurity professional standards and the UK Cyber Security Council are redefining trust, talent, and resilience in finance.]]></description>
										<content:encoded><![CDATA[<p>The latest <strong><a href="https://open.spotify.com/episode/6AAdwUbHx3EZBBuqoSEe0M" target="_blank" rel="noopener" title="" data-wpel-link="external">NCSC Cyber Series</a></strong> podcast gathers three voices who know the battlefield from different angles:</p>



<p><em>Tracey Jones, Senior Analyst at the Bank of England; Gian Andrea Padovani, Senior Manager in the PRA’s Cyber-Resilience team; and Chris Ensor, Deputy Director for Cyber Growth at the NCSC</em>. Their discussion turns a spotlight on an issue that rarely makes headlines yet shapes every breach report we read: professional standards.</p>



<h2 class="wp-block-heading">The Credibility Gap</h2>



<p>Finance lives on confidence. When penetration testers walk into a systemic bank or when threat-intelligence teams map criminal campaigns, boards and regulators must trust the people, not just the tools. That trust now depends on well-defined accreditation schemes—CBEST in the UK finance sector is one example—where only practitioners holding the highest recognised certifications can touch live systems. Ensor argues that, without such benchmarks, even the best framework slides into “guesswork hiring” and inconsistent risk judgements.</p>



<h2 class="wp-block-heading">Enter the UK Cyber Security Council</h2>



<p>Ensor outlines a three-part mandate for the fledgling Council: spell out what “good” looks like for each specialism, audit the bodies that award qualifications, and maintain a public register of professionals who meet four ascending levels of competence. It is a model borrowed from medicine and law, adjusted for a discipline whose job titles still vary wildly between companies.</p>



<h1 class="wp-block-heading">More Than Tech Skills</h1>



<p>Jones and Padovani insist that the next generation must pair deep technical insight with something harder to teach: translation. Cyber threats are now boardroom risks, so packet captures and CVE lists have to be recast as business narratives. The mythical “unicorn”—the engineer who codes exploits at night and briefs CEOs at dawn—may remain rare, but multi-disciplinary teams can cover the gap if each member’s specialism is clear.</p>



<h2 class="wp-block-heading">How Finance Is Leading</h2>



<p>Within the Bank of England, cross-market groups such as CMORG convene CISOs to trade playbooks on issues like AI governance and software-supply-chain security. These sessions turn regulator guidance (for instance, the NCSC’s recent software-security principles) into practical checklists, then recycle lessons back into sector-wide guidance. The loop works only because participants share a baseline language of standards and certifications; without it, meetings would stall in definitional debates.</p>



<h2 class="wp-block-heading">Bridging the Skills Shortage</h2>



<p>All three guests converge on one plea: industry must take ownership of entry-level experience. Certifications prove knowledge, not judgement under pressure. Much as law firms nurture trainee solicitors, security consultancies and in-house teams have to invest in apprenticeships and rotations, or the UK skills gap will persist no matter how tidy the standards framework becomes.</p>



<h2 class="wp-block-heading">Reasons for Optimism</h2>



<p>Jones sees hope in culture: cybersecurity has moved from “IT problem” to board-level priority. Padovani welcomes growing recognition of cyber roles by both government and private sector. Ensor bets on the Council to provide the cohesion the field lacks—and urges companies and regulators alike to require its standards so that demand, as well as supply, drives professionalisation.</p>



<p><strong>Bottom line:</strong> if boards want fewer nasty surprises and practitioners want clearer career maps, backing a single, transparent set of professional standards is the fastest lever both groups can pull.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14713</post-id>	</item>
		<item>
		<title>TLPT: Threat Led Penetration Testing Explained</title>
		<link>https://bsg.tech/blog/tlpt-threat-led-penetration-testing-explained/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 08:00:00 +0000</pubDate>
				<category><![CDATA[Tools & Methods]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14706</guid>

					<description><![CDATA[Discover how TLPT (threat led penetration testing) helps organizations validate defenses against real-world cyber threats. Learn who needs threat led pentesting, what drives demand, and how it differs from red teaming and classic pentesting.]]></description>
										<content:encoded><![CDATA[<p><strong>Threat Led Penetration Testing (TLPT)</strong>, also known as <strong>threat-led pentesting</strong>, is the gold standard for realistic cybersecurity validation. TLPT combines the latest <strong>threat intelligence</strong>, <strong>red teaming tactics</strong>, and <strong>business risk analysis</strong> to simulate attacks that your organization is most likely to face. Unlike generic pentesting, TLPT tests not just your systems for vulnerabilities, but also your ability to <strong>detect, respond to, and contain</strong> those attacks in real time.</p>



<p>At its core, TLPT helps organizations understand how their <strong>critical systems</strong>, <strong>people</strong>, and <strong>processes</strong> hold up against modern, targeted cyber threats.</p>



<h2 class="wp-block-heading">Who Needs Threat Led Pentesting?</h2>



<p>TLPT is not just for big banks anymore. While <strong>financial services organizations</strong>—such as banks, insurers, and payment providers—are required to conduct TLPT under frameworks like <strong>TIBER-EU</strong>, <strong>CBEST</strong>, and <strong>DORA</strong>, its value extends to:</p>



<ul class="wp-block-list">
<li>Critical infrastructure providers (energy, transportation, healthcare)</li>



<li>Large enterprises managing sensitive data or operations</li>



<li>Technology companies supporting national or regional infrastructure</li>



<li>Any business with board-level concern about cyber resilience</li>
</ul>



<p>If your organization handles high-value data, provides essential services, or faces persistent threats from well-resourced adversaries, TLPT is an essential tool in your security arsenal.</p>



<h2 class="wp-block-heading">What Drives the Demand for TLPT?</h2>



<p>The demand for <strong>threat led penetration testing</strong> is growing fast, driven by several key factors:</p>



<ul class="wp-block-list">
<li><strong>Regulatory compliance:</strong> Laws like <strong>DORA</strong>, <strong><a href="https://bsg.tech/blog/wp-content/uploads/2024/12/ENISA.webp" target="_blank" rel="noopener" title="NIS2, ENISA and cyber security governance" data-wpel-link="internal">NIS2</a></strong>, and sector frameworks like <strong>TIBER-EU</strong> and <strong>CBEST</strong> mandate TLPT for financial services and critical sectors. Failure to conduct regular TLPT can lead to penalties or loss of trust.</li>



<li><strong>Realistic risk assessment:</strong> TLPT maps cybersecurity gaps to actual business risk, helping boards and leadership teams make informed decisions.</li>



<li><strong>Detection and response validation:</strong> Classic pentests check if you’re vulnerable; TLPT checks if you can stop an attack in progress. It validates both technology and human readiness.</li>



<li><strong>Rising threat sophistication:</strong> Cybercriminals, nation-state actors, and organized groups are more capable than ever. TLPT ensures your defenses evolve to match.</li>
</ul>



<h2 class="wp-block-heading">How to Choose the Right TLPT Provider</h2>



<p>Selecting the right <strong>threat led pentesting</strong> provider is crucial. Here’s what to look for:</p>



<h3 class="wp-block-heading">Threat Intelligence Capability</h3>



<p>Your provider must have access to, or partner with, a qualified <strong>threat intelligence team</strong> that can profile the adversaries most relevant to your business, sector, and geography. In regulated TLPT (e.g., under TIBER-EU), the threat intelligence function is typically independent.</p>



<h3 class="wp-block-heading">Red Team Proficiency</h3>



<p>The provider must demonstrate experience in <strong>red team operations</strong>, with proven ability to emulate advanced persistent threats (APTs), conduct lateral movement, and operate undetected.</p>



<h3 class="wp-block-heading">Compliance Alignment</h3>



<p>If you’re subject to <strong>TIBER-EU</strong>, <strong>CBEST</strong>, or <strong>DORA</strong>, your provider should have credentials, references, or certifications showing compliance with those standards.</p>



<h3 class="wp-block-heading">Clear Process and Transparency</h3>



<p>Look for providers who offer structured, transparent TLPT delivery—covering scoping, intelligence gathering, red teaming, purple team workshops, and remediation support.</p>



<h3 class="wp-block-heading">Industry Experience</h3>



<p>A provider that understands the <strong>threat landscape and business environment of your sector</strong> will deliver better results. A TLPT for a bank differs significantly from one for a utility.</p>



<h2 class="wp-block-heading">TLPT vs Red Teaming vs Classic Penetration Testing</h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th><strong>Service</strong></th><th><strong>Primary Goal</strong></th><th><strong>Approach</strong></th><th><strong>Focus Area</strong></th></tr></thead><tbody><tr><td><strong>Classic Pentesting</strong></td><td>Identify vulnerabilities in systems or apps</td><td>Automated + manual tests</td><td>Technical flaws</td></tr><tr><td><strong>Red Teaming</strong></td><td>Test detection and response via simulated attacks</td><td>Stealth, adversary simulation</td><td>Defensive capability</td></tr><tr><td><strong>Threat Led Penetration Testing (TLPT)</strong></td><td>Test critical systems and detection with real-world threats</td><td>Stealth, intelligence-driven</td><td>Business-critical risk, regulatory alignment</td></tr></tbody></table></figure>



<p>TLPT combines elements of <strong>red teaming</strong> with <strong>threat intelligence</strong> and <strong>business risk focus</strong>, offering the most comprehensive view of your resilience against targeted cyberattacks.</p>



<h2 class="wp-block-heading">What Is the Value of TLPT?</h2>



<p>The value of <strong>threat led penetration testing (TLPT)</strong> includes:</p>



<ul class="wp-block-list">
<li>Real-world simulation of the most likely threats your organization faces</li>



<li>Complete testing of technology, people, and processes</li>



<li>Validation of your detection and response capabilities</li>



<li>Clear evidence for board-level risk management and security investment</li>



<li>Fulfillment of regulatory requirements such as DORA and TIBER-EU</li>



<li>Improved knowledge and skills through collaborative purple team exercises</li>
</ul>



<h2 class="wp-block-heading">Why TLPT Matters for Modern Organizations</h2>



<p>As cyberattacks become more sophisticated and targeted, <strong>threat led pentesting</strong> provides confidence that your security program can handle real adversaries. It helps organizations:</p>



<ul class="wp-block-list">
<li>Prepare for credible attack scenarios based on current threat intelligence</li>



<li>Identify weaknesses beyond what traditional pentests find</li>



<li>Strengthen detection, alerting, and incident response</li>



<li>Align cybersecurity priorities with real business risks</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p><strong>Threat led penetration testing (TLPT)</strong> is the evolution of security testing. It combines intelligence, technical expertise, and business focus to help organizations build true cyber resilience. Whether required by regulation or adopted as a best practice, TLPT is a vital part of defending against today’s most dangerous threats.</p>



<p>Ready to strengthen your defenses with threat led penetration testing? Explore our <a href="https://bsg.tech/penetration-testing/" data-wpel-link="external">penetration testing</a> services for a comprehensive assessment of your systems, or discover how our <a href="https://bsg.tech/application-security/" data-wpel-link="external">application security</a> approaches help secure your critical software from real-world threats. Let BSG help you build resilience through targeted, intelligence-driven testing.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14706</post-id>	</item>
		<item>
		<title>EUVD Vulnerability Database: Europe’s Answer to CVE Instability</title>
		<link>https://bsg.tech/blog/euvd-europes-answer-to-cve-instability/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Wed, 14 May 2025 09:11:06 +0000</pubDate>
				<category><![CDATA[Infosec News]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14681</guid>

					<description><![CDATA[The EUVD marks a strategic shift in vulnerability management, offering a transparent and sovereign alternative to the U.S.-centric CVE system—backed by EU law.]]></description>
										<content:encoded><![CDATA[<p>As the MITRE-run CVE program faces operational challenges, Europe has quietly launched a significant alternative. The <strong>European Vulnerability Database (EUVD)</strong>, developed by ENISA, officially went live in April 2025.</p>



<p>Though some viewed it as a reaction to MITRE’s instability, the EUVD was long in the making. Its creation was mandated under the <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555" target="_blank" rel="noopener" title="" data-wpel-link="external"><strong>NIS2 Directive</strong></a> (Articles 62–63), adopted in 2022, which required ENISA to develop a vulnerability database serving the EU digital ecosystem.</p>



<h2 class="wp-block-heading">Why EUVD Exists</h2>



<p>The goal is both operational and political: build <strong>cybersecurity sovereignty</strong> and improve vulnerability visibility across EU infrastructure. Existing national databases, like the U.S. CVE and China’s CNNVD, have been criticized for <strong>selective disclosure</strong>—with <a href="https://www.zetter-zeroday.com/u-s-government-disclosed-39-zero-day-vulnerabilities-in-2023-per-first-ever-report/" target="_blank" rel="noopener" title="" data-wpel-link="external">some U.S. agencies delaying reports</a> of zero-days for strategic reasons.</p>



<p>With the EUVD, Brussels is asserting control over vulnerability intelligence, subject to <strong>transparency and accountability rules</strong> that mirror EU values.</p>



<p>In ENISA’s words, the EUVD is a “central hub” for software and hardware vulnerability data, helping national CSIRTs, critical infrastructure providers, and software developers act faster on disclosed flaws (<a href="https://www.enisa.europa.eu/news/consult-the-european-vulnerability-database-to-enhance-your-digital-security" target="_blank" rel="noopener" title="" data-wpel-link="external">ENISA announcement</a>).</p>



<h2 class="wp-block-heading">How EUVD Works</h2>



<p>The <a href="https://euvd.enisa.europa.eu/" target="_blank" rel="noopener" title="" data-wpel-link="external">EUVD portal</a> currently functions as an aggregator of known vulnerabilities. It assigns its own IDs but also mirrors CVEs. Notably, ENISA is an authorized <strong>CVE Numbering Authority (CNA)</strong>—but it’s also developing a <strong>parallel identification system</strong>, which could lead to some friction or confusion.</p>



<p>In the long term, this dual-ID model may enable the EU to <strong>spot omissions, lags, or discrepancies</strong> in U.S. or Chinese databases, bolstering resilience across the continent.</p>



<h2 class="wp-block-heading">Powered by Law: NIS2 + Cyber Resilience Act</h2>



<p>Two key regulations will give EUVD real teeth:</p>



<ol start="1" class="wp-block-list">
<li><strong>NIS2</strong> requires large providers to report vulnerabilities.</li>



<li>The <a href="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act" target="_blank" rel="noopener" title="" data-wpel-link="external"><strong>Cyber Resilience Act</strong></a> (effective September 2025) mandates vendors to report <strong>actively exploited bugs</strong>—which will feed directly into EUVD.</li>
</ol>



<p>This legal backbone could transform EUVD from a passive aggregator into a <strong>leading vulnerability disclosure system</strong> in Europe.</p>



<h2 class="wp-block-heading">What It Means for Security Teams</h2>



<p>For cybersecurity vendors and defenders, EUVD brings:</p>



<ul class="wp-block-list">
<li>A <strong>redundant, independent source</strong> of vulnerability data.</li>



<li>Faster alignment with <strong>EU-specific compliance</strong> regimes.</li>



<li>A chance to cross-check disclosures across CVE and EUVD listings.</li>
</ul>



<p>While still in early stages, EUVD is Europe’s bid to ensure <strong>vulnerability intelligence is not dependent on foreign actors</strong>—a strategic move in an era of digital autonomy.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The EUVD is more than just a database—it’s a <strong>political and regulatory instrument</strong> aimed at reshaping how vulnerability management works in Europe. It won’t replace CVE overnight, but it signals a shift toward <strong>a multipolar vulnerability landscape</strong>, where no single country controls the global flow of bug disclosures.</p>



<p>With enforcement of NIS2 and the Cyber Resilience Act on the horizon, expect the EUVD to play an increasingly central role in vulnerability response across Europe.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14681</post-id>	</item>
		<item>
		<title>Cyber Incident Response Tips for Small Businesses</title>
		<link>https://bsg.tech/blog/cyber-incident-response-tips-for-small-businesses/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Sat, 03 May 2025 14:06:58 +0000</pubDate>
				<category><![CDATA[Tools & Methods]]></category>
		<category><![CDATA[Cyber Incident Response]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14670</guid>

					<description><![CDATA[Learn how small businesses can build cyber incident response plans by adapting practical strategies from the UK’s “Cyber Incident Grab Bag.”]]></description>
										<content:encoded><![CDATA[<p>In today’s volatile cyber landscape, even small businesses are not immune to disruptive cyberattacks. Ransomware, phishing, and data breaches increasingly target companies of all sizes, and the ability to respond effectively can mean the difference between recovery and ruin. Interestingly, a valuable resource developed for UK local governments offers practical lessons for the private sector: the Local Government Association’s “Cyber Incident Grab Bag.”</p>



<p>Though originally designed for public sector entities, this guide provides a concise, actionable framework that small and medium-sized businesses (SMBs) can adapt to strengthen their cyber incident response capabilities and recovery planning.</p>



<h2 class="wp-block-heading">Why Small Businesses Need a Cyber Incident Response Plan</h2>



<p>The frequency of cyberattacks on SMBs is rising, but many still lack formal response plans. A structured cyber incident response plan helps minimize downtime, reduce data loss, and prevent reputational damage. Drawing from the UK’s experience, small businesses can take proactive steps to build resilience.</p>



<h2 class="wp-block-heading">1. Prepare a Hardcopy Cyber Incident Response Kit</h2>



<p>When systems go down, digital playbooks may become inaccessible. The Grab Bag emphasizes the importance of a printed cyber incident response plan with contact lists, escalation paths, and business-critical functions. SMBs should prepare physical copies of:</p>



<ul class="wp-block-list">
<li>Key personnel and vendor contacts</li>



<li>System recovery checklists</li>



<li>Incident reporting and containment steps</li>
</ul>



<p>Having this kit accessible ensures that response efforts continue even if digital infrastructure is compromised.</p>



<h2 class="wp-block-heading">2. Map and Prioritize Critical Business Systems</h2>



<p>The guide urges local governments to document their digital services. Similarly, SMBs should maintain an up-to-date inventory of:</p>



<ul class="wp-block-list">
<li>Essential business systems (e.g., accounting, CRM, POS)</li>



<li>Data dependencies (e.g., customer records, invoices, backups)</li>



<li>Recovery time objectives (RTOs)</li>
</ul>



<p>Clear system mapping enables swift triage during a cyber incident response.</p>



<h2 class="wp-block-heading">3. Define Roles for Cyber Incident Management</h2>



<p>During a cyber crisis, confusion is costly. The Grab Bag recommends pre-assigning roles like incident coordinator, communications lead, and IT recovery manager. For small businesses, even a basic role matrix can:</p>



<ul class="wp-block-list">
<li>Speed up decision-making</li>



<li>Clarify who talks to customers or regulators</li>



<li>Avoid duplicated efforts</li>
</ul>



<p>Defined roles make your cyber incident response plan more actionable and accountable.</p>



<h2 class="wp-block-heading">4. Practice Cyber Incident Scenarios</h2>



<p>UK councils are encouraged to run tabletop exercises simulating cyber incidents. SMBs can adopt this practice by rehearsing:</p>



<ul class="wp-block-list">
<li>What happens if the main server is encrypted</li>



<li>How staff communicate during an outage</li>



<li>Who handles media, customers, or regulators</li>
</ul>



<p>Simulating attacks reveals weaknesses and builds team confidence in cyber incident response procedures.</p>



<h2 class="wp-block-heading">5. Coordinate External Support in Advance</h2>



<p>The Grab Bag stresses relationships with national incident response bodies and IT providers. For SMBs, this translates to:</p>



<ul class="wp-block-list">
<li>Knowing who to call (e.g., MSSPs, lawyers, insurers)</li>



<li>Ensuring vendor SLAs cover cyber incident response</li>



<li>Preparing backup communication channels (like a separate phone tree or alternate email system)</li>
</ul>



<p>Establishing these contacts before an attack helps avoid costly delays during incident response.</p>



<h2 class="wp-block-heading">6. Document and Review Each Cyber Incident</h2>



<p>Post-incident reviews are vital. After any incident:</p>



<ul class="wp-block-list">
<li>Record what happened and what actions were taken</li>



<li>Identify delays or failures in response</li>



<li>Update your cyber incident response plan accordingly</li>
</ul>



<p>Continuous improvement ensures stronger outcomes in future incidents.</p>



<h2 class="wp-block-heading">Final Thought: Be Ready, Not Reactive</h2>



<p>Cyber resilience isn’t just a concern for governments or big corporations. The “<a href="https://www.local.gov.uk/our-support/cyber-digital-and-technology/cyber-incident-grab-bag-local-authorities/restoring-systems" target="_blank" rel="noopener nofollow" title="" class="broken_link" data-wpel-link="external">Cyber Incident Grab Bag</a>” serves as a powerful reminder that preparation matters. By borrowing and tailoring its core principles, small businesses can build cost-effective, practical cyber incident response capabilities. When a breach happens—and it likely will—your ability to restore operations quickly will depend not on your size, but on your readiness.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14670</post-id>	</item>
		<item>
		<title>CVE Under Threat: What You Need to Know</title>
		<link>https://bsg.tech/blog/cve-under-threat-what-you-need-to-know/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Wed, 16 Apr 2025 15:01:36 +0000</pubDate>
				<category><![CDATA[Infosec News]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14633</guid>

					<description><![CDATA[MITRE’s CVE contract expired on April 16, putting global vulnerability tracking at risk. Learn what’s happening and how the security community is responding.]]></description>
										<content:encoded><![CDATA[<p>The <strong>Common Vulnerabilities and Exposures (CVE)</strong> program is one of the most critical pillars of modern cybersecurity. Without it, organizations around the world would struggle to identify, track, and prioritize vulnerabilities in software and hardware. But as of <strong>April 16, 2025</strong>, this essential system is facing a major disruption: the expiration of MITRE’s federal contract to operate the CVE program. Here’s what’s happening—and why you should care.</p>



<h2 class="wp-block-heading">What Is CVE and Why Is It So Important?</h2>



<p><strong>CVE</strong>, or <em>Common Vulnerabilities and Exposures</em>, is a standardized system for identifying and cataloging publicly known cybersecurity vulnerabilities. Each CVE entry provides a unique ID for a specific vulnerability, along with basic descriptive information and references. This system enables consistent, cross-vendor communication about security issues.</p>



<p>For example, when a new vulnerability is discovered in a product, assigning it a <strong>CVE ID</strong> allows organizations, vendors, and threat intelligence tools to refer to it uniformly. CVEs are embedded in:</p>



<ul class="wp-block-list">
<li>Vulnerability scanners (like Nessus, Qualys, and NeXpose)</li>



<li>Security advisories from vendors (like Microsoft, Cisco)</li>



<li>Patch management systems</li>



<li>SIEMs and SOAR tools</li>



<li>Threat intelligence platforms</li>
</ul>



<p>Without CVEs, the industry would lack a shared language for tracking threats, leading to inefficiencies and confusion across the entire cyber security domain.</p>



<h2 class="wp-block-heading">What Is the CVE Database, NVD, and How Do They Work Together?</h2>



<p>The <strong><a href="http://cve.mitre.org" target="_blank" rel="noopener" title="" data-wpel-link="external">CVE database</a></strong>, often referred to as the <em>CVE List</em>, is the official catalog of all CVE identifiers. While CVEs themselves only contain basic information, they act as the anchor point for a broader vulnerability ecosystem.</p>



<p>The <strong><a href="https://nvd.nist.gov" target="_blank" rel="noopener" title="" data-wpel-link="external">National Vulnerability Database (NVD)</a></strong>—maintained by <strong>NIST</strong>—extends CVE data by providing severity metrics (such as <strong>CVSS scores</strong>), impact vectors, fix references, and exploitation details. Many security products consume NVD data to enrich alerts and drive prioritization.</p>



<p>Together, CVE and NVD form the backbone of vulnerability management globally. Their data feeds into thousands of cybersecurity systems, shaping decisions from patch prioritization to security budgeting.</p>



<h2 class="wp-block-heading">What Role Does MITRE Play in the CVE Program?</h2>



<p><strong>MITRE</strong> is a nonprofit organization that has operated the CVE program since its creation in 1999. Under a contract with the <strong>Department of Homeland Security (DHS)</strong> and its <strong>Cybersecurity and Infrastructure Security Agency (CISA)</strong>, MITRE manages:</p>



<ul class="wp-block-list">
<li>The <strong>CVE List</strong></li>



<li>A global network of <strong>CVE Numbering Authorities (CNAs)</strong>—including major software vendors and security firms</li>



<li>Coordination of the <strong>CVE Board</strong>, which governs policies and procedures</li>



<li>Related taxonomies like the <strong>Common Weakness Enumeration (CWE)</strong> and the <strong>ATT&amp;CK framework</strong></li>
</ul>



<p>MITRE’s role has been instrumental in keeping the CVE program transparent, neutral, and reliable.</p>



<h2 class="wp-block-heading">Why Is the CVE Program Now Under Threat?</h2>



<p>On <strong>April 16, 2025</strong>, MITRE’s federal contract to operate the CVE program expired. While MITRE had been expecting a renewal or extension, the funding was delayed or canceled due to broader budget decisions made by the current U.S. administration.</p>



<p>Security journalists and industry analysts have linked the funding lapse to cost-cutting measures and reorganization within the federal cybersecurity strategy. The consequences of this disruption are severe:</p>



<ul class="wp-block-list">
<li>Risk of delayed CVE assignments</li>



<li>Inconsistent vulnerability reporting across vendors</li>



<li>Erosion of trust in public vulnerability databases</li>



<li>Disruption of tools and workflows that depend on CVE IDs</li>
</ul>



<p>A temporary extension was granted at the last minute by CISA, but it only postpones the underlying issue. The future of the CVE program now hangs in the balance.</p>



<h2 class="wp-block-heading">How Is the Cybersecurity Community Responding?</h2>



<p>Recognizing the danger of allowing CVE operations to be dictated by short-term politics, members of the CVE Board and cybersecurity leaders are taking action:</p>



<ul class="wp-block-list">
<li>A new <strong>CVE Foundation</strong> has been launched to ensure long-term governance, independence, and funding of the CVE program</li>



<li>The open-source and security research communities are advocating for a more decentralized, resilient infrastructure for vulnerability tracking</li>



<li>Vendors and security platforms are preparing fallback mechanisms in case CVE publishing is interrupted</li>
</ul>



<p>This response mirrors what many experts have called for over the years: a globally distributed model for vulnerability management that doesn’t rely on a single point of failure.</p>



<h2 class="wp-block-heading">What&#8217;s Next? Stay Tuned</h2>



<p>At <strong><a href="https://bsg.tech" target="_blank" rel="noopener" title="" data-wpel-link="external">BSG</a></strong>, we understand the foundational role that CVEs play in <a href="https://bsg.tech/penetration-testing/" target="_blank" rel="noopener" title="" data-wpel-link="external"><strong>red teaming</strong></a>, threat modeling, incident response, and security automation. Whether you’re a security researcher or a CISO, your daily decisions rely on trusted, standardized vulnerability data.</p>



<p>We’re closely monitoring the CVE situation and will:</p>



<ul class="wp-block-list">
<li>Update clients and partners about any major changes to CVE access or structure</li>



<li>Ensure our tools and services remain compatible with future formats like <strong>CVE JSON 5.0</strong></li>



<li>Continue to advocate for transparent, community-driven vulnerability disclosure processes</li>
</ul>



<p>Stay secure. Stay updated.</p>



<p><strong>Update (April 16, 2025):</strong> Shortly after public concern mounted, <strong>CISA confirmed a short-term extension of MITRE’s contract</strong> to operate the CVE program, temporarily averting a shutdown. The extension, executed as an option period on the existing agreement, ensures continued publication and maintenance of CVE records—for now. While this move buys the cybersecurity community some time, the future of the program remains uncertain, and long-term funding or structural reforms have yet to be announced. We will continue to monitor developments and update this post as the situation evolves.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14633</post-id>	</item>
		<item>
		<title>Unforgivable Software Vulnerabilities</title>
		<link>https://bsg.tech/blog/unforgivable-software-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 14:27:14 +0000</pubDate>
				<category><![CDATA[Tools & Methods]]></category>
		<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14610</guid>

					<description><![CDATA[Some software vulnerabilities are unforgivable—easy to find, easy to fix, and never should’ve existed. Here’s how to spot and prevent them.]]></description>
										<content:encoded><![CDATA[<p>Every piece of software has bugs. Many have vulnerabilities. But not all software vulnerabilities are created equal.</p>



<p>Some are complicated, buried deep in obscure logic, or made possible by bleeding-edge exploit techniques. Others—well, others are glaringly obvious. These are the ones that make security professionals shake their heads and ask: <em>How did this ever make it to production?</em></p>



<p>In a recent post, the <a href="https://www.ncsc.gov.uk/report/a-method-to-assess-forgivable-vs-unforgivable-vulnerabilities" data-wpel-link="external">UK’s National Cyber Security Centre (NCSC)</a> offered a new way to think about security flaws: classify them as <strong>forgivable</strong> or <strong>unforgivable</strong>. This simple distinction challenges developers and product owners to reflect not just on <em>what</em> the vulnerability is, but <em>why</em> it happened—and what that says about their software development practices.</p>



<p>This isn’t a new concept. In 2007, Steve Christey of MITRE coined the term <strong>“unforgivable vulnerabilities”</strong> in a paper that remains remarkably relevant today. He also proposed a model—<strong>Vulnerability Assessment Assurance Levels (VAAL)</strong>—to measure the depth, complexity, and preventability of a vulnerability.</p>



<p>In this blog post, we explore what makes a vulnerability unforgivable, why it matters for your software security posture, and how this mindset can change the way your team handles vulnerability management.</p>



<h2 class="wp-block-heading">What Are Unforgivable Software Vulnerabilities?</h2>



<p>Christey’s concept of <strong>unforgivable software vulnerabilities</strong> is not about severity alone—it’s about obviousness, laziness, and negligence.</p>



<p>A software vulnerability is <strong>unforgivable</strong> when it:</p>



<ul class="wp-block-list">
<li>Has been widely known and well-documented for years</li>



<li>Can be easily discovered with simple manual testing</li>



<li>Uses canonical, low-effort attack techniques</li>



<li>Is present in the most frequently used parts of an application</li>



<li>Could be spotted in minutes by a security-aware developer or tester</li>
</ul>



<p>Examples of Unforgivable Vulnerabilities:</p>



<ul class="wp-block-list">
<li><strong>SQL Injection</strong> via login forms or user ID parameters</li>



<li><strong>XSS (Cross-site Scripting)</strong> using basic &lt;script> tags in web input fields</li>



<li><strong>Remote File Inclusion</strong> using unsanitized GET/POST variables</li>



<li><strong>Directory Traversal</strong> with ../.. in file names</li>



<li><strong>Hard-coded admin passwords</strong> in production builds</li>



<li><strong>World-writable system executables</strong> or configuration files</li>



<li><strong>Authentication bypass</strong> using obvious tricks like authenticated=true</li>
</ul>



<p>These aren’t rare edge cases. They’re foundational flaws that have been addressed in secure coding guides, university lectures, and OWASP Top 10 lists for over a decade. Their presence in modern software reveals a serious gap in secure development awareness.</p>



<h2 class="wp-block-heading">VAAL: A Framework for Maturity in Software Vulnerability Management</h2>



<p>To formalize this thinking, Christey proposed the <strong>Vulnerability Assessment Assurance Levels (VAAL)</strong>—a framework that looks beyond CVSS scores to assess a vulnerability’s broader context.</p>



<p>VAAL includes dimensions such as:</p>



<ul class="wp-block-list">
<li><strong>Access constraints</strong>: Can an unauthenticated user exploit it?</li>



<li><strong>Feature frequency</strong>: Is the vulnerable code path commonly used?</li>



<li><strong>Novelty</strong>: Is the vulnerability a known class, or something new?</li>



<li><strong>Manipulation complexity</strong>: How easy is the exploit to craft?</li>



<li><strong>Effort to discover</strong>: Could it be found in five minutes with basic tools?</li>



<li><strong>Severity &amp; ubiquity</strong>: Does it affect all installations, or just edge cases?</li>
</ul>



<p>Unforgivable software vulnerabilities score <em>low</em> across these metrics—meaning they’re easy to find, easy to exploit, and hard to justify.</p>



<h2 class="wp-block-heading">NCSC’s Take: Context and Culture Matter</h2>



<p>The NCSC’s approach adds an ethical and cultural dimension to the technical framework. They encourage analysts and developers to ask:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“Given the maturity of the product, team, and context—should this vulnerability still be happening?”</p>
</blockquote>



<p>It’s a subtle but powerful shift in thinking. A critical vulnerability might be <strong>forgivable</strong> if it’s highly complex or the result of a novel exploit. Conversely, a low-severity bug might be <strong>unforgivable</strong> if it’s the result of blind trust in user input, lack of validation, or copy-pasted insecure code.</p>



<p>This perspective invites software development teams to reflect not just on their <strong>software vulnerabilities</strong>, but on their processes, culture, and learning.</p>



<h2 class="wp-block-heading">Why This Matters in 2025</h2>



<p>Despite decades of secure coding education, <strong>unforgivable vulnerabilities are still rampant</strong>. At BSG, we regularly uncover issues during penetration testing that indicate not just individual mistakes—but fundamental development failures:</p>



<ul class="wp-block-list">
<li>Login forms vulnerable to SQL injection</li>



<li>Client-side security checks with no server validation</li>



<li>Open directories or world-writable configuration files</li>



<li>Hardcoded backdoors “left in for testing”</li>
</ul>



<p>These flaws aren’t just risky—they’re reputational liabilities.</p>



<p>In a world where <strong>software supply chain attacks</strong> and <strong>zero-day exploits</strong> dominate headlines, no organization can afford to ship code that breaks on <strong>page one of the security playbook</strong>.</p>



<h2 class="wp-block-heading">How to Apply This Thinking</h2>



<p>You don’t need to overhaul your entire SDLC to start identifying and preventing unforgivable software vulnerabilities. Start with these steps:</p>



<ol class="wp-block-list">
<li><strong>Make a checklist</strong>: Use Christey’s “Lucky 13” as a baseline during code reviews.</li>



<li><strong>Shift-left with purpose</strong>: Train developers to spot “Found in Five” issues early.</li>



<li><strong>Use smarter metrics</strong>: Don’t just track CVSS—track VAAL-like maturity signals.</li>



<li><strong>Measure progress</strong>: Are you seeing fewer obvious bugs over time?</li>



<li><strong>Assess third-party software</strong>: Demand secure-by-design practices from your vendors.</li>
</ol>



<h2 class="wp-block-heading">TL;DR: Forgive the Novel, Condemn the Negligent</h2>



<p>The takeaway is simple: <strong>not all software vulnerabilities are forgivable</strong>. Some are signs of innovation. Others are signs of negligence.</p>



<p>If your product—or a product you’re relying on—still has unauthenticated RCE due to a hardcoded password, the issue isn’t just technical. It’s cultural.</p>



<p>By adopting a mindset that distinguishes between forgivable and unforgivable flaws, you improve not just your security posture, but your entire engineering discipline.</p>



<h2 class="wp-block-heading">Want help reviewing your software for unforgivable vulnerabilities?</h2>



<p>We specialize in secure development assessments, penetration testing, and risk-based remediation strategies. Let’s make sure your code reflects your commitment to security.</p>



<p><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <a href="https://bsg.tech/contact" data-wpel-link="external">Contact us today</a></p>



<p></p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14610</post-id>	</item>
		<item>
		<title>Preventing Crypto Exchange Hacks: Lessons from Bybit Heist</title>
		<link>https://bsg.tech/blog/preventing-crypto-exchange-hacks-lessons-from-bybit-heist/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 09:27:46 +0000</pubDate>
				<category><![CDATA[Infosec News]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14596</guid>

					<description><![CDATA[Bybit lost $1.4B in a North Korean hack via malware, fake UI, and blind signing. Learn key security strategies to protect exchanges from cyber threats!]]></description>
										<content:encoded><![CDATA[<p>Bybit, a cryptocurrency exchange, <a href="https://announcements.bybit.com/article/incident-update---eth-cold-wallet-incident-blt292c0454d26e9140/" target="_blank" rel="noopener" title="" data-wpel-link="external">recently suffered one of the largest crypto thefts in history</a>, with attackers making off with $1.4 billion. The attack, attributed to North Korean cybercriminals, exploited vulnerabilities in Bybit&#8217;s security processes, leveraging malware and social engineering to bypass multi-signature protections. This blog post breaks down how the attack occurred, the techniques used by the attackers, and lessons for the crypto industry.</p>



<h2 class="wp-block-heading">Attack Breakdown</h2>



<p>Bybit employed cold wallets secured by hardware wallets (Ledger devices) and a multi-signature approval process requiring several key personnel to authorize transactions. Despite these precautions, attackers successfully compromised the exchange by:</p>



<ol class="wp-block-list">
<li><strong>Infecting Staff Devices</strong>: The attackers deployed malware on the computers of multiple Bybit employees, including its CEO. This malware enabled them to manipulate the multi-signature transaction approval process.</li>



<li><strong>Fake UI for Multi-Signature Approval</strong>: Attackers created a fraudulent user interface that mimicked Bybit&#8217;s legitimate multi-signature process. This deceived employees into approving what appeared to be normal transactions, but in reality, these signed away control of the exchange’s cold wallet.</li>



<li><strong>Blind Signing Exploitation</strong>: Bybit&#8217;s team used Ledger hardware wallets that displayed transaction details for verification. However, due to the complexity of multi-signature smart contract transactions, the wallets displayed opaque hexadecimal data rather than clear recipient information. Employees were likely conditioned to approve transactions without understanding the full details, making them susceptible to manipulation.</li>



<li><strong>Deployment of a Malicious Smart Contract</strong>: The attackers pre-deployed a smart contract that mimicked the legitimate transaction approval function but instead transferred ownership of Bybit’s cold wallet to them.</li>



<li><strong>Execution of Fraudulent Transactions</strong>: By obtaining legitimate multi-signature approvals, the attackers gained full control of Bybit’s cold wallet and transferred the funds into their own accounts.</li>
</ol>



<h2 class="wp-block-heading">Techniques Used by Attackers</h2>



<p>The attack leveraged a combination of sophisticated cyber intrusion tactics and behavioral exploitation. Key techniques included:</p>



<ul class="wp-block-list">
<li><strong>Social Engineering &amp; UI Manipulation</strong>: Convincing staff to approve transactions without verifying them properly.</li>



<li><strong>Malware Deployment</strong>: Infecting key personnel’s systems to manipulate transaction approvals.</li>



<li><strong>Blind Signing Exploitation</strong>: Taking advantage of the lack of readable transaction details on hardware wallets.</li>



<li><strong>Smart Contract Proxy Attack</strong>: Deploying a malicious contract to impersonate legitimate transaction execution.</li>



<li><strong>Credential Theft &amp; Persistence</strong>: Gaining persistent access to Bybit’s infrastructure for extended operational control.</li>
</ul>



<h2 class="wp-block-heading">Lessons for the Crypto Industry</h2>



<p>This attack underscores the importance of robust operational security and strict procedural controls in managing high-value cryptocurrency transactions. Key takeaways include:</p>



<ol class="wp-block-list">
<li><strong>Independent Transaction Verification</strong>: Always verify transaction details on hardware wallets instead of relying on UI confirmations.</li>



<li><strong>Dedicated Secure Devices</strong>: Conduct high-value crypto transactions only on isolated, single-purpose devices that are not used for regular browsing or email.</li>



<li><strong>Behavioral Security Training</strong>: Staff should be trained to recognize and challenge unusual transaction requests, even if they appear routine.</li>



<li><strong>Stronger Multi-Sig Controls</strong>: Consider requiring additional, independent verification outside of the compromised system before authorizing large transactions.</li>



<li><strong>Regular Security Audits</strong>: Perform white-box <strong><a href="https://bsg.tech/penetration-testing/" target="_blank" rel="noreferrer noopener" data-wpel-link="external">penetration testing</a></strong> to identify software and process vulnerabilities before hackers do.</li>



<li><strong>Continuous Monitoring</strong>: Regularly audit transaction history and blockchain interactions for anomalies.</li>
</ol>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The Bybit hack serves as a stark reminder that even sophisticated security measures can be undermined by human and procedural weaknesses. North Korean attackers successfully bypassed Bybit’s multi-signature protections through social engineering, malware, and smart contract exploitation. The crypto industry must learn from this breach and implement <a href="https://bsg.tech/cyber-security/" target="_blank" rel="noopener" title="" data-wpel-link="external"><strong>stronger operational controls</strong></a> to prevent similar attacks in the future.</p>



<p></p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14596</post-id>	</item>
		<item>
		<title>Cyber Defense Using Cyber Kill Chain and MITRE ATT&#038;CK Explained</title>
		<link>https://bsg.tech/blog/cyber-defense-using-cyber-kill-chain-and-mitre-attck-explained/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Thu, 06 Feb 2025 13:41:48 +0000</pubDate>
				<category><![CDATA[Tools & Methods]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14577</guid>

					<description><![CDATA[Learn how the Cyber Kill Chain and MITRE ATT&#038;CK Framework enhance security by identifying, detecting, and responding to cyber threats effectively.]]></description>
										<content:encoded><![CDATA[<p>In today’s threat landscape, cyberattacks are more sophisticated and persistent than ever. Organizations need structured approaches to detect, analyze, and respond to threats effectively. Two critical frameworks that have shaped modern cybersecurity defense are the <strong><a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html" target="_blank" rel="noopener" title="" data-wpel-link="external">Cyber Kill Chain</a></strong> and the <strong><a href="https://attack.mitre.org/" target="_blank" rel="noopener" title="" data-wpel-link="external">MITRE ATT&amp;CK Framework</a></strong>. Understanding these models can significantly improve threat detection, incident response, and overall cybersecurity resilience.</p>



<h2 class="wp-block-heading">Why the Cyber Kill Chain and ATT&amp;CK Framework Matter for Cyber Defense</h2>



<p>Cybercriminals continuously evolve their tactics, techniques, and procedures (TTPs), making it essential for organizations to stay ahead. The Cyber Kill Chain and MITRE ATT&amp;CK Framework provide structured methodologies to:</p>



<ul class="wp-block-list">
<li><strong>Identify attack patterns</strong> and predict attacker behavior.</li>



<li><strong>Improve threat detection</strong> by recognizing indicators of compromise (IOCs).</li>



<li><strong>Strengthen incident response</strong> with a clear understanding of adversary tactics.</li>



<li><strong>Optimize security controls</strong> by mapping real-world attacks to known techniques.</li>
</ul>



<p>By leveraging these frameworks, cybersecurity teams can proactively disrupt attacks and enhance their security postures.</p>



<h2 class="wp-block-heading">The Cyber Kill Chain: A Game-Changer in Cybersecurity</h2>



<p>Introduced by Lockheed Martin in 2011, the <strong>Cyber Kill Chain</strong> applies a military-based strategy to cyber defense. This model breaks down cyberattacks into seven distinct phases:</p>



<ol class="wp-block-list">
<li><strong>Reconnaissance</strong> – Attackers gather intelligence on the target.</li>



<li><strong>Weaponization</strong> – Malicious payloads are created.</li>



<li><strong>Delivery</strong> – Malware is transmitted to the victim.</li>



<li><strong>Exploitation</strong> – Vulnerabilities are exploited to gain access.</li>



<li><strong>Installation</strong> – Malicious software is installed.</li>



<li><strong>Command &amp; Control (C2)</strong> – Attackers establish control over the compromised system.</li>



<li><strong>Actions on Objectives</strong> – Attackers achieve their end goals, such as data exfiltration or system destruction.</li>
</ol>



<p>This model transformed cybersecurity by emphasizing proactive defense. By disrupting attacks at any phase, security teams can prevent full-scale breaches.</p>



<h2 class="wp-block-heading">MITRE’s Research: The Foundation of ATT&amp;CK</h2>



<p>MITRE’s <strong>Fort Meade Experiment (FMX)</strong> in 2013 laid the groundwork for ATT&amp;CK by analyzing adversary behaviors in controlled environments. By tracking real-world cyber incidents, researchers built a comprehensive knowledge base of attack techniques, leading to the development of the <strong>MITRE ATT&amp;CK Framework</strong>.</p>



<h2 class="wp-block-heading">MITRE ATT&amp;CK: A Universal Taxonomy of Cyber Threats</h2>



<p>The <strong>MITRE ATT&amp;CK Framework</strong> provides an extensive matrix of attacker TTPs across multiple domains, including Windows, macOS, Linux, mobile, and cloud environments. The framework is structured into three main components:</p>



<ul class="wp-block-list">
<li><strong>Tactics:</strong> The <strong>why</strong> behind an attack (e.g., persistence, privilege escalation, data exfiltration).</li>



<li><strong>Techniques:</strong> The <strong>how</strong> attackers execute their tactics (e.g., credential dumping, phishing, DLL sideloading).</li>



<li><strong>Procedures:</strong> Variations in how techniques are applied in real-world attacks.</li>
</ul>



<p>Security teams use ATT&amp;CK to <strong>map threats</strong>, <strong>enhance detection rules</strong>, and <strong>simulate attacks</strong> using adversary emulation techniques.</p>



<h2 class="wp-block-heading">The Importance of Cyber Threat Intelligence Sharing</h2>



<p>Cyber threats impact organizations globally, making intelligence sharing critical for proactive defense. ATT&amp;CK facilitates collaboration by:</p>



<ul class="wp-block-list">
<li>Providing a <strong>common language</strong> to describe and share threat intelligence.</li>



<li>Enabling <strong>cross-sector collaboration</strong> between government, private sector, and research institutions.</li>



<li>Supporting <strong>faster response times</strong> to emerging threats.</li>



<li>Helping with <strong>threat attribution</strong> by linking attack techniques to known threat actors.</li>
</ul>



<p>Organizations that adopt <strong>threat intelligence sharing platforms</strong> like <strong>MISP (Malware Information Sharing Platform)</strong> and <strong>MITRE CTI</strong> strengthen their overall security defenses.</p>



<h2 class="wp-block-heading">Conclusion: Strengthening Cyber Defense with ATT&amp;CK and Kill Chain</h2>



<p>Both the Cyber Kill Chain and MITRE ATT&amp;CK Framework have redefined how cybersecurity professionals understand and counter cyber threats. By implementing these frameworks, organizations can:</p>



<ul class="wp-block-list">
<li>Improve <strong>threat detection</strong> by identifying attack patterns.</li>



<li>Optimize <strong>incident response</strong> through structured attack analysis.</li>



<li>Enhance <strong>proactive security measures</strong> by disrupting adversaries early.</li>



<li>Foster <strong>collaboration</strong> in cybersecurity through intelligence sharing.</li>
</ul>



<p>For businesses looking to <strong>stay ahead of cyber threats</strong>, leveraging these frameworks is essential. If you need expert guidance in implementing <strong>advanced cybersecurity strategies</strong>, our team at BSG can help. <strong><a href="https://bsg.tech/contact/" target="_blank" rel="noopener" title="" data-wpel-link="external">Contact us today</a></strong> to strengthen your security posture and stay resilient against evolving cyber threats.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14577</post-id>	</item>
		<item>
		<title>The Future of Authentication: Passkeys vs Passwords and 2FA</title>
		<link>https://bsg.tech/blog/the-future-of-authentication-when-passkeys-beat-passwords-and-2fa/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Wed, 22 Jan 2025 09:22:47 +0000</pubDate>
				<category><![CDATA[BSG News]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14569</guid>

					<description><![CDATA[Passkeys replace passwords with secure, easy logins using biometrics and cryptography, eliminating phishing, breaches, and 2FA issues.]]></description>
										<content:encoded><![CDATA[<p>Passwords have been around for decades, but they come with plenty of headaches. Many people use weak passwords or reuse the same ones across different sites. This makes them easy targets for hackers. Phishing attacks, where scammers trick you into giving up your password, are still very common. And even if you have a strong password, it’s no good if it gets stolen in a data breach.</p>



<p>Two-factor authentication (2FA) helps by adding another layer of security, but it’s not perfect either. It can be inconvenient, especially if you lose your 2FA device. And some methods, like SMS-based codes, are vulnerable to SIM-swapping attacks where hackers hijack your phone number.</p>



<p>So, what’s the solution? Enter passkeys.</p>



<h2 class="wp-block-heading">What Are Passkeys?</h2>



<p>Passkeys are a new, secure way to log in without needing passwords. They use something called public key cryptography, along with your device’s built-in biometrics, like a fingerprint or face scan.</p>



<p>Here’s how they work:</p>



<ul class="wp-block-list">
<li>When you set up a passkey, your device creates two keys: a private one that stays on your device and a public one shared with the website or app.</li>



<li>When you log in, the site sends a challenge to your device.</li>



<li>Your device signs the challenge with the private key and verifies your identity using your biometrics.</li>



<li>The site checks the signature using the public key, and you’re in—no passwords needed.</li>
</ul>



<p>Major platforms like Apple, Google, and Microsoft already support passkeys, and they work seamlessly across devices through cloud backups.</p>



<h2 class="wp-block-heading">Why Passkeys Are More Secure</h2>



<p>Passkeys solve many of the security problems that come with passwords and 2FA:</p>



<ul class="wp-block-list">
<li><strong>No Phishing</strong>: Since you don’t type anything, scammers can’t trick you into revealing your login details.</li>



<li><strong>No Credential Stuffing</strong>: Hackers can’t reuse stolen credentials from one site on another.</li>



<li><strong>No Keylogging</strong>: Passkeys don’t involve typing, so malware that records keystrokes won’t work.</li>



<li><strong>No Man-in-the-Middle Attacks</strong>: Passkeys rely on cryptographic exchanges, making interception pointless.</li>
</ul>



<h2 class="wp-block-heading">Challenges to Keep in Mind</h2>



<p>While passkeys are a big improvement, they’re not perfect yet. Here are some things to consider:</p>



<ul class="wp-block-list">
<li><strong>Limited Support</strong>: Not every service offers passkey logins yet, so you’ll still need passwords for some sites.</li>



<li><strong>Device Issues</strong>: If you lose the device with your passkeys, you’ll need to rely on cloud backups or recovery methods.</li>



<li><strong>Education</strong>: Many people don’t know about passkeys yet, so there’s a learning curve.</li>



<li><strong>Privacy Concerns</strong>: Some users worry about how their biometric data is handled, but it’s important to note this data is stored locally on your device, not shared.</li>
</ul>



<h2 class="wp-block-heading">Move Towards a Password-Free Future</h2>



<p>Passkeys offer a simpler, more secure way to log in. If a service you use supports passkeys, try enabling them. They’re easier to use, safer from cyberattacks, and eliminate the frustration of remembering passwords.</p>



<p>If you run a business, now’s the time to start offering passkey support to protect your users and stay ahead of the curve. Together, we can make passwords a thing of the past and create a safer online world—one passkey at a time.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14569</post-id>	</item>
		<item>
		<title>Lessons from 2024’s Worst Cyberattacks and How to Stay Secure</title>
		<link>https://bsg.tech/blog/lessons-from-2024s-worst-cyberattacks-and-how-to-stay-secure/</link>
		
		<dc:creator><![CDATA[Blog Editor]]></dc:creator>
		<pubDate>Mon, 13 Jan 2025 21:47:29 +0000</pubDate>
				<category><![CDATA[Infosec News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://bsg.tech/blog/?p=14560</guid>

					<description><![CDATA[Analyzing 2024’s biggest cyberattacks: breaches, vulnerabilities exploited, and actionable steps to strengthen defenses for 2025.]]></description>
										<content:encoded><![CDATA[<p>2024 was a challenging year for cybersecurity, with some of the most significant data breaches and cyberattacks making headlines. In this article, we analyze the key breaches outlined in <em>Wired’s</em> article, <a href="https://www.wired.com/story/worst-hacks-2024/" target="_blank" rel="noopener nofollow" title="" data-wpel-link="external">“The Worst Hacks of 2024,”</a> along with high-value reference sources to dive deeper into the methods attackers used and the lessons we can learn. For each breach, we summarize the incident, highlight the vulnerabilities exploited, and recommend actionable countermeasures to strengthen defenses.</p>



<h2 class="wp-block-heading">1. China’s Salt Typhoon Telecom Breaches</h2>



<p>The Chinese cyber espionage group Salt Typhoon gained unauthorized access to U.S. telecom companies, including Verizon and AT&amp;T. The group exploited vulnerabilities in network defenses to geolocate individuals and eavesdrop on private phone calls. Notably, the attackers targeted fewer than 150 individuals, such as those under U.S. wiretap orders, state department officials, and presidential campaign members.</p>



<h3 class="wp-block-heading">What Went Wrong</h3>



<ul class="wp-block-list">
<li>Weak segmentation of telecom infrastructure allowed attackers to access sensitive systems.</li>



<li>Insufficient monitoring failed to detect prolonged unauthorized access.</li>
</ul>



<h3 class="wp-block-heading">Recommended Countermeasures</h3>



<ul class="wp-block-list">
<li><strong>Network Segmentation:</strong> Isolate sensitive systems to prevent lateral movement within networks.</li>



<li><strong>Advanced Threat Detection:</strong> Deploy AI-powered tools to identify anomalies and stop unauthorized access in real time.</li>



<li><strong>Zero-Trust Security Model:</strong> Assume all network traffic is hostile until proven otherwise and verify every access request.</li>
</ul>



<h2 class="wp-block-heading">2. Snowflake Customer Breaches</h2>



<p>Attackers breached Snowflake’s client accounts using stolen passwords, affecting organizations such as Ticketmaster, Santander Bank, and Neiman Marcus. They accessed sensitive customer data and communications. AT&amp;T admitted that nearly all customer communications from a seven-month period in 2022 had been compromised, highlighting the magnitude of the breach.</p>



<h3 class="wp-block-heading">What Went Wrong</h3>



<ul class="wp-block-list">
<li>Lack of mandatory multi-factor authentication (MFA) for user accounts.</li>



<li>Reliance on weak password policies, making accounts vulnerable to credential-stuffing attacks.</li>
</ul>



<h3 class="wp-block-heading">Recommended Countermeasures</h3>



<ul class="wp-block-list">
<li><strong>Enforce MFA:</strong> Require all users to implement two-factor authentication for account access.</li>



<li><strong>Educate Users on Security Best Practices:</strong> Promote strong password creation and secure credential management.</li>
</ul>



<p>• <strong>Zero-Trust Authentication:</strong> Continuously verify user identities even after login.</p>



<h2 class="wp-block-heading">3. Change Healthcare Ransomware Attack</h2>



<p>In February, the ALPHV/BlackCat ransomware group targeted Change Healthcare, affecting over 100 million individuals. The attack disrupted healthcare services nationwide and resulted in the exfiltration of personal and medical data.</p>



<h3 class="wp-block-heading">What Went Wrong</h3>



<ul class="wp-block-list">
<li>Lack of proactive ransomware detection tools.</li>



<li>Insufficient offline backups of critical data, leaving the organization vulnerable to ransom demands.</li>
</ul>



<h3 class="wp-block-heading">Recommended Countermeasures</h3>



<ul class="wp-block-list">
<li><strong>Endpoint Protection:</strong> Deploy endpoint detection and response (EDR) solutions to identify ransomware before it spreads.</li>



<li><strong>Regular Backups:</strong> Store encrypted backups offline or in a secure, isolated environment.</li>



<li><strong>Incident Response Plans:</strong> Prepare and regularly test response plans for ransomware scenarios.</li>
</ul>



<h2 class="wp-block-heading">4. Russia’s Midnight Blizzard Attack on Microsoft</h2>



<p>Midnight Blizzard, a Russian SVR-linked hacking group, exploited a legacy test account to breach Microsoft’s executive email systems. The attack revealed the risks of legacy accounts with elevated privileges and poor monitoring.</p>



<h3 class="wp-block-heading">What Went Wrong</h3>



<ul class="wp-block-list">
<li>Historic test accounts were not decommissioned or secured, providing a backdoor for attackers.</li>



<li>Weak access controls enabled misuse of privileged accounts.</li>
</ul>



<h3 class="wp-block-heading">Recommended Countermeasures</h3>



<ul class="wp-block-list">
<li><strong>Regular Account Audits:</strong> Identify and disable unused accounts, especially those with elevated privileges.</li>



<li><strong>Principle of Least Privilege:</strong> Ensure all accounts have the minimum permissions required for their roles.</li>



<li><strong>Multi-Factor Authentication (MFA):</strong> Apply MFA to all accounts, especially for privileged access.</li>
</ul>



<h2 class="wp-block-heading">5. National Public Data Breach</h2>



<p>The National Public Data breach exposed the personal information of 1.3 million individuals, including Social Security numbers, financial data, and contact details. The incident highlighted the consequences of poor encryption practices and delayed breach detection.</p>



<h3 class="wp-block-heading">What Went Wrong</h3>



<ul class="wp-block-list">
<li>Sensitive data was stored without adequate encryption, making it easy to exfiltrate.</li>



<li>Lack of real-time intrusion detection allowed attackers to remain undetected for weeks.</li>
</ul>



<h3 class="wp-block-heading">Recommended Countermeasures</h3>



<ul class="wp-block-list">
<li><strong>Encrypt Data at Rest and in Transit:</strong> Use industry-standard encryption to protect sensitive information.</li>



<li><strong>Intrusion Detection Systems (IDS):</strong> Deploy IDS to detect unauthorized activity and breaches in real time.</li>



<li><strong>Incident Response Training:</strong> Train staff on breach detection and immediate response protocols.</li>
</ul>



<h2 class="wp-block-heading">6. North Korean Cryptocurrency Thefts</h2>



<p>North Korean hackers escalated their activities in 2024, stealing $1.34 billion in cryptocurrency across 47 incidents. This accounted for 61% of global cryptocurrency thefts during the year. The attackers exploited weak platform security and user practices, targeting exchanges, wallets, and DeFi platforms.</p>



<h3 class="wp-block-heading">What Went Wrong</h3>



<ul class="wp-block-list">
<li>Vulnerabilities in cryptocurrency exchanges and wallets were exploited.</li>



<li>Poor user security practices, such as the lack of multi-factor authentication, left accounts exposed.</li>
</ul>



<h3 class="wp-block-heading">Recommended Countermeasures</h3>



<ul class="wp-block-list">
<li><strong>Harden Exchange Security:</strong> Implement stricter security protocols for cryptocurrency platforms, including mandatory MFA and hardware wallet integration.</li>



<li><strong>User Education:</strong> Train users to adopt secure practices, such as using hardware wallets and enabling MFA.</li>



<li><strong>Global Cybercrime Cooperation:</strong> Strengthen international partnerships to track and prosecute crypto-related crimes.</li>
</ul>



<h2 class="wp-block-heading">Key Lessons Learned from 2024</h2>



<p>The major breaches of 2024 highlight recurring themes in cybersecurity: insufficient network segmentation, inadequate authentication measures, weak encryption, and a lack of proactive monitoring. Organizations can and must adopt stronger cybersecurity measures to safeguard themselves against increasingly sophisticated attacks.</p>



<h3 class="wp-block-heading">Top Recommendations</h3>



<ol class="wp-block-list">
<li><strong>Zero-Trust Architecture:</strong> Verify all access requests, even from within the network.</li>



<li><strong>Multi-Factor Authentication:</strong> Enforce MFA for all accounts, especially those with elevated privileges.</li>



<li><strong>Proactive Monitoring:</strong> Leverage AI-powered threat detection tools to identify and mitigate threats in real time.</li>



<li><strong>Regular Security Audits:</strong> <a href="https://bsg.tech/cyber-security/" target="_blank" rel="noopener" title="" data-wpel-link="external">Conduct audits</a> to identify and address vulnerabilities before they are exploited.</li>



<li><strong>Cybersecurity Awareness Training:</strong> Equip employees and users with the knowledge to recognize and prevent cyber threats.</li>
</ol>



<p>By analyzing and learning from the failures of 2024, we can move toward a more secure digital environment in 2025 and beyond. The time to act is now.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14560</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 23/189 objects using Redis
Page Caching using Redis (Page is feed) 
Minified using Redis

Served from: bsg.tech @ 2025-09-01 19:51:00 by W3 Total Cache
-->