We trust in security

Blog

We trust in security - Blog

Turn on the nightly news or your favorite TV drama and you’re bound to hear mentions of a vast criminal underworld hidden in plain sight. All you need is a computer or mobile device to get there. This is the dark web. It’s home to hackers, scammers, malware developers and a whole host of other threat actors - some of which are even state-sponsored groups looking to weaponize intelligence. Learn what every cybersecurity professional needs to know about this vast underground network.

Checkmarx , the Software Exposure Platform for the enterprise, announced that it was named a Leader in Gartner’s 2019 analyst report, Magic Quadrant for Application Security Testing for the second consecutive year. According to the report, “DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.

Execution - Powershell (T1086)

Introduction This post is the second about MITRE ATT&CK Enterprise Matrix covering execution techniques using Powershell. Powershell is a commandline interface (CLI) with command and scripting capabilities. Its main targets are System Administrators to automate task and control it. It requires .Net framework 2.0 as minimum requirement, and it was presented with Windows vista, and included on Windows 7, 8 and10, but it is not installed by default. Windows 2008 Server R1 include it on its default installation and it can be installed on Mac and Linux.