<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>MAPGENESYS Inc.</title>
	<atom:link href="https://mapgenesys.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://mapgenesys.com/</link>
	<description>Delivering Transformation Innovatively</description>
	<lastBuildDate>Wed, 15 Feb 2023 15:13:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://mapgenesys.com/wp-content/uploads/2022/07/mapgenesys-favicon.png</url>
	<title>MAPGENESYS Inc.</title>
	<link>https://mapgenesys.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protecting Your Business: Expert Tips for Creating a Comprehensive Cybersecurity Strategy</title>
		<link>https://mapgenesys.com/expert-tips-for-comprehensive-cybersecurity-strategy/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Wed, 15 Feb 2023 14:45:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity tips and advice]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=4814</guid>

					<description><![CDATA[Cybersecurity is critical for businesses. Learn how to reduce your risk of cyber-attacks and protect your network, data, and reputation with a comprehensive cybersecurity strategy.]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="4814" class="elementor elementor-4814">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-5981398 elementor-section-content-middle ct-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5981398" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69d5360" data-id="69d5360" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8c02f17 elementor-widget elementor-widget-heading" data-id="8c02f17" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Protecting Your Business: Expert Tips for Creating a Comprehensive Cybersecurity Strategy</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-7c894d3 elementor-widget elementor-widget-heading" data-id="7c894d3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">In the digital age, cybersecurity threats are becoming increasingly sophisticated and widespread. Cybercriminals are constantly finding new ways to exploit vulnerabilities in business networks and steal sensitive data. According to a recent report by Cybersecurity Ventures, cybercrime is expected to cost the world $10.5 trillion annually by 2025. With these figures in mind, it's clear that creating a comprehensive cybersecurity strategy is no longer optional - it's essential for the survival of any business.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c3c7f27 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="c3c7f27" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-99c95b4" data-id="99c95b4" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3cca6ec elementor-widget elementor-widget-heading" data-id="3cca6ec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Conducting a Thorough Threat Assessment</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-76a5e9a elementor-widget elementor-widget-text-editor" data-id="76a5e9a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The first step in creating a comprehensive cybersecurity strategy is to conduct a thorough threat assessment. This involves identifying the specific types of cyber threats that your business is most vulnerable to. According to a survey by Cybersecurity Insiders, the top three cybersecurity threats faced by businesses in 2021 are phishing attacks (66%), ransomware (54%), and malware (53%). By understanding these threats, you can develop a plan to address them and minimize your risk.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-8315329 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="8315329" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d387267" data-id="d387267" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-78964e5 elementor-widget elementor-widget-heading" data-id="78964e5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Developing a Risk Management Plan</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-0383c55 elementor-widget elementor-widget-heading" data-id="0383c55" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Once you've identified your specific cyber threats, the next step is to develop a risk management plan. This plan should outline the steps you'll take to mitigate each type of threat, as well as the measures you'll take to prevent them from occurring in the first place. According to a survey by Deloitte, the most common cybersecurity measures implemented by businesses in 2021 include firewalls (86%), antivirus software (85%), and access controls (82%).</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-453a1c6 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="453a1c6" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1171fff" data-id="1171fff" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-4880b63 elementor-widget elementor-widget-heading" data-id="4880b63" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Securing Your Network and Data</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-33e1a24 elementor-widget elementor-widget-heading" data-id="33e1a24" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Another key aspect of a comprehensive cybersecurity strategy is network and data security. This includes securing your company's IT infrastructure, such as servers, routers, and switches. According to a report by Statista, the global cybersecurity market is expected to reach $248.26 billion by 2023. This indicates the growing need for businesses to invest in network and data security measures such as encryption, access controls, and incident response plans.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-009b74a ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="009b74a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4723cf4" data-id="4723cf4" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-00a1f28 elementor-widget elementor-widget-heading" data-id="00a1f28" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Educating Your Employees</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-c6233ef elementor-widget elementor-widget-heading" data-id="c6233ef" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Employee training is another important part of a comprehensive cybersecurity strategy. Many cyber-attacks are the result of human error, such as clicking on a phishing email or using a weak password. According to a survey by KnowBe4, 96% of cybersecurity breaches are caused by human error. By training your employees on best practices for cybersecurity, you can reduce the likelihood of these types of incidents. Some training topics might include password management, email security, and social engineering awareness.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-25b46fd ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="25b46fd" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fff665a" data-id="fff665a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d4e09a1 elementor-widget elementor-widget-heading" data-id="d4e09a1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Ensuring Compliance with Regulations and Standards</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-287b5c0 elementor-widget elementor-widget-heading" data-id="287b5c0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Compliance is another important consideration when developing a cybersecurity strategy. Depending on your industry and the types of data you handle, you may be subject to certain regulations and standards, such as HIPAA or PCI DSS. Ensuring that you are in compliance with these requirements is an essential part of protecting your business from legal and financial consequences.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-bad6e16 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="bad6e16" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c87934a" data-id="c87934a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3f01829 elementor-widget elementor-widget-heading" data-id="3f01829" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Managing Vulnerabilities</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-2d86e7b elementor-widget elementor-widget-heading" data-id="2d86e7b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Finally, vulnerability management is an ongoing process that is essential for maintaining the security of your business. This involves regularly scanning your network for vulnerabilities and weaknesses, and taking steps to address any issues that are identified. According to a survey by Ponemon Institute, the average time to identify a data breach is 228 days, and the average time to contain it is 83 days. By actively managing your vulnerabilities, you can reduce the impact of any potential breaches.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-8abf57f elementor-widget elementor-widget-heading" data-id="8abf57f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">The cost of a cyber-attack can be devastating for a business, not only in terms of financial losses but also damage to reputation and customer trust. By investing in a comprehensive cybersecurity strategy, you can protect your business and give yourself and your customers peace of mind.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-8f995d2 elementor-widget elementor-widget-heading" data-id="8f995d2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">With cybercrime on the rise, it's more important than ever for businesses to prioritize cybersecurity. According to a report by Varonis, there were 5,258 data breaches in 2020, resulting in the exposure of 8.4 billion records. The total cost of cybercrime is expected to reach $6 trillion by 2025. These statistics show that cybersecurity is a critical issue for businesses of all sizes and in all industries.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-15b341b elementor-widget elementor-widget-heading" data-id="15b341b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">In addition to the financial and reputational costs of a cyber-attack, businesses can also face legal consequences for failing to protect sensitive data. For example, under GDPR regulations, businesses can face fines of up to 4% of their global annual revenue for non-compliance with data protection rules. This highlights the importance of ensuring compliance with relevant regulations and standards when developing a cybersecurity strategy.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-ddfafe6 elementor-widget elementor-widget-heading" data-id="ddfafe6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">In conclusion, cybersecurity is a critical issue that every business must take seriously. By conducting a thorough threat assessment, developing a risk management plan, securing your network and data, educating your employees, ensuring compliance with regulations and standards, and managing vulnerabilities, you can reduce your risk of cyber-attacks and minimize the impact of any incidents that do occur. With cybercrime on the rise, investing in a comprehensive cybersecurity strategy is no longer optional - it's essential for the survival of your business.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Third-Party Risk Management</title>
		<link>https://mapgenesys.com/third-party-risk-management/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Fri, 07 Oct 2022 13:45:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity tips and advice]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=4402</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="4402" class="elementor elementor-4402">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-5981398 elementor-section-content-middle ct-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5981398" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69d5360" data-id="69d5360" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-82ccd69 elementor-section-full_width mtx-sticky-section-container elementor-section-height-default elementor-section-height-default" data-id="82ccd69" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a903a87 mtx-sticky-section-left elementor-hidden-mobile" data-id="a903a87" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5e8967c elementor-widget elementor-widget-heading" data-id="5e8967c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Contents</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-217d9d8 elementor-align-start mtx-sticky-section-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="217d9d8" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="#what-is-tprm">

											<span class="elementor-icon-list-text">What is Third-Party Risk Management?</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="#tprm-services">

											<span class="elementor-icon-list-text">Third Party Risk Services</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="#tprm-benefits">

											<span class="elementor-icon-list-text">Benefits of Third-Party Risk Management</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="#tprm-importance">

											<span class="elementor-icon-list-text">Importance of TPRM as a Service</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="#tprm-grc-it">

											<span class="elementor-icon-list-text">GRC – IT Assurance Services</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="#tprm-grc-enterprise">

											<span class="elementor-icon-list-text">GRC – Enterprise Risk Management</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="#tprm-grc-riskaudit">

											<span class="elementor-icon-list-text">GRC – Risk-Audit Assurance Services</span>
											</a>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-99a3136" data-id="99a3136" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8c02f17 elementor-widget elementor-widget-heading" data-id="8c02f17" data-element_type="widget" data-e-type="widget" id="what-is-tprm" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">What is Third-Party Risk Management?</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-fed2f86 elementor-widget elementor-widget-image" data-id="fed2f86" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
																<a href="https://mapgenesys.com/third-party-security-risk-management-playbook/?utm_source=tprm-blog&#038;utm_medium=leaderboard-banner" target="_blank">
							<img fetchpriority="high" decoding="async" width="728" height="90" src="https://mapgenesys.com/wp-content/uploads/2022/08/tprm-banner-content.png" class="attachment-large size-large wp-image-4320" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/08/tprm-banner-content.png 728w, https://mapgenesys.com/wp-content/uploads/2022/08/tprm-banner-content-300x37.png 300w" sizes="(max-width: 728px) 100vw, 728px" />								</a>
															</div>
				</div>
				<div class="elementor-element elementor-element-7c894d3 elementor-widget elementor-widget-heading" data-id="7c894d3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Third-Party Risk Management (TPRM) is the process of identifying, analyzing, and reducing the risks associated with the third-party vendors/suppliers</p>				</div>
				</div>
				<div class="elementor-element elementor-element-1775f7c elementor-widget elementor-widget-heading" data-id="1775f7c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Every organization engages third-party to deliver products and services. These vendors can range from few to hundreds to thousands depending on the size of the organization and nature of products and services they offer. Their services and products are needed for day-to-day operations that helps these organizations to deliver back to their clients to manage their markets.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-e5813b1 elementor-widget elementor-widget-heading" data-id="e5813b1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Every vendor carries a potential risk profile while delivering such products and services. Management in most organizations would assume a higher level of security that comes with it. However, no vendor can escape from being a victim of Cyber Attacks, Data Exploits, and other Breaches, Unless the vendor truly understands the security within.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-b0bffa8 elementor-widget elementor-widget-heading" data-id="b0bffa8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Most organizations are struggling with their TPRM/VRM/SRM Program, as they do not fulfil the activities critical to operations in the areas of vendor risk profiles, compliance, and quality benchmarking (Assessments). The products/solutions as provided by Vendor/Supplier/Third party has some form of weakness which remains underestimated.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-3cca6ec elementor-widget elementor-widget-heading" data-id="3cca6ec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">How can We Help You?</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-76a5e9a elementor-widget elementor-widget-text-editor" data-id="76a5e9a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>mapgenesys can help corporates and SMB to overcome risks that’s not addressed completely, even if you’re managing risks internally. mapgenesys solutions would help you to gain more insight and have a centralized visibility into risks that concerns more. mapgenesys Accelerates a Unified Third-Party Risk Program which integrates with GRC functions and IT Assurance services.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-db7beb2 elementor-widget elementor-widget-text-editor" data-id="db7beb2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>mapgenesys’s Supplier/Third-party risk management program has been designed to an organization of all fit (size and ecosystem). We help our clients to build an efficient and effective Third-party relationship so that your leadership can trust and benefit from the exchange of services/products without any business interruptions, without any risks and minimizing the scope of any potential breach.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-474d39d elementor-widget elementor-widget-text-editor" data-id="474d39d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									mapgenesys help clients resolving critical challenges around Supplier/Third-party risk in the areas of Regulatory Compliance, Governance, Operations, Legal and Financial and Technology risks. mapgenesys Solutions help bridge GAP between the Supplier/Third party and our clients. mapgenesys Provides RAAS (Risk Assurance as Service), where we assess and understand your existing vendor risk portfolios and Risk landscape and help you design a process to manage all vendors centrally, then in a distributed environment with automation as and where needed.								</div>
				</div>
				<div class="elementor-element elementor-element-b853a04 elementor-widget elementor-widget-text-editor" data-id="b853a04" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									mapgenesys has designed effective TPRM/<a href="https://mapgenesys.com/security-and-risk-management/"><strong>SRM solutions</strong></a> that help our clients benefit from less risky supplier/Third-Party partnership. We provide a unified solution that’s tied with the centralized management process that are robust, repeatable, and flexible enough to grow with your business.								</div>
				</div>
				<div class="elementor-element elementor-element-78964e5 elementor-widget elementor-widget-heading" data-id="78964e5" data-element_type="widget" data-e-type="widget" id="tprm-services" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Third-Party Risk Services</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-2412420 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="2412420" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">We are the interface between our clients and their Vendors</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">We assess and evaluate our client’s security objectives, compliance &amp; Internal controls, and Risk appetite (the assessment is mapped back to the vendor assessment to understand if the vendor meets the client’s security requirements)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">We identify the scope and requirement of the product/service and initiate the vendor security assessment process (Pre and Post assessment process; based on the vendor profile)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">We complete the due diligence process (Risk Information: SOC II report, Pen Test Reports, Security Questionnaire, Disclosures, etc.) and provide a detailed analysis and recommendations</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">All Risks as identified will be monitored and tracked for risk remediation measures with process enhancements as needed</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">We provide vendor risk profile summary at a high level to better engage vendors based on Business/strategy changes</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">We integrate and unify various Industry standard and regulatory frameworks to keep our client’s business compliant and safe from cyber incidents (attacks, exploits, breaches, etc.)</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-7f2e7c5 elementor-widget elementor-widget-heading" data-id="7f2e7c5" data-element_type="widget" data-e-type="widget" id="tprm-benefits" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Benefits of Third-Party Risk Management</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-e44b173 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="e44b173" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Management has visibility in their vendor’s risk profile which results in better informed decisions that relate to new and emerging technologies</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Manage time and save cost on resources and infrastructure</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Avoid/Minimize Operation, Legal threats, Regulation actions, Reputation/Brand issues, Data and Security compromises, financial losses, etc.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Always stay compliant with various regulations and standards</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-4880b63 elementor-widget elementor-widget-heading" data-id="4880b63" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Our array of Services</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-995f6aa elementor-widget elementor-widget-image" data-id="995f6aa" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
																<a href="https://mapgenesys.com/wp-content/uploads/2022/05/TPRM-edited-image.jpg" data-elementor-open-lightbox="yes" data-elementor-lightbox-title="TPRM-edited-image" data-e-action-hash="#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjE1MSwidXJsIjoiaHR0cHM6XC9cL21hcGdlbmVzeXMuY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIyXC8wNVwvVFBSTS1lZGl0ZWQtaW1hZ2UuanBnIn0%3D">
							<img decoding="async" width="1024" height="576" src="https://mapgenesys.com/wp-content/uploads/2022/05/TPRM-edited-image-1024x576.jpg" class="attachment-large size-large wp-image-2151" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/TPRM-edited-image-1024x576.jpg 1024w, https://mapgenesys.com/wp-content/uploads/2022/05/TPRM-edited-image-300x169.jpg 300w, https://mapgenesys.com/wp-content/uploads/2022/05/TPRM-edited-image-768x432.jpg 768w, https://mapgenesys.com/wp-content/uploads/2022/05/TPRM-edited-image.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" />								</a>
															</div>
				</div>
				<div class="elementor-element elementor-element-0fe645e elementor-widget elementor-widget-heading" data-id="0fe645e" data-element_type="widget" data-e-type="widget" id="tprm-importance" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Importance of TPRM as a Service </h2>				</div>
				</div>
				<div class="elementor-element elementor-element-5c4cb91 elementor-widget elementor-widget-heading" data-id="5c4cb91" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Most Organizations, Markets and Governments always face the heat of growing Cybersecurity Malicious activities and incidents. We all know the worst cyber-attacks of 2021 that were experienced by SolarWind, Microsoft Exchange, <a href="https://mapgenesys.com/revil-ransomware-attack/">REvil</a>, Colonial Pipeline, Kaseya, Microsoft's (Print)Nightmare and Log4.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-fc8f515 elementor-widget elementor-widget-heading" data-id="fc8f515" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">We don’t know who would be next, but we can help you to avoid such unforeseen and unfortunate situations. </p>				</div>
				</div>
				<div class="elementor-element elementor-element-ab6d421 elementor-widget elementor-widget-heading" data-id="ab6d421" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Third-Party risks should be a point of great concern. Most organizations do not have the capacity to fulfil the Due-Diligence process on their Vendors. One risk will breach the foundation of the organization that attracts loss of Brand reputation, penalties and more. Third-Party risks can be accounted based on the evaluation areas of Regulatory Compliance, Operational, Legal, Strategic, Financial Risks and Cyber Security events.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-25047ec elementor-widget elementor-widget-heading" data-id="25047ec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Governance Risk and Compliance (GRC) Program</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-84238ec elementor-widget elementor-widget-heading" data-id="84238ec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys will bring value to your business with the array of GRC and IT Assurance services.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-0aed53d elementor-widget elementor-widget-heading" data-id="0aed53d" data-element_type="widget" data-e-type="widget" id="tprm-grc-it" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">GRC – IT Assurance Services</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-8f0822b elementor-widget elementor-widget-heading" data-id="8f0822b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys’s Unified Governance, Risk and Compliance Services (GRC) program offers a complete range of IT Audit, Risk and Compliance Assurance Solutions that are tailormade for different industry verticals across small, medium, and large organizations/Enterprises.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-5323ec3 elementor-widget elementor-widget-heading" data-id="5323ec3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">We provide these solutions based on the organization’s size, culture, business, sector, geographical presence and spread and relevant regulatory requirements as applied.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-eeee7f0 elementor-widget elementor-widget-heading" data-id="eeee7f0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">mapgenesys Can overcome the challenges an Organizations/Enterprise faces:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-d09f8c5 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="d09f8c5" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Overcome the need to optimize ROI arising from the IT Assurance program</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Overcome Resource/skill shortage as needed to deliver IT Assurance Program</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Overcome Distributed domain specialist support. (Support Audit reviews and IT Controls for Internal and Vendor/Third Party Risks)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Overcome Compliance with specific regulation/Legislation/standards with reference to IT Controls</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Overcome Risk and Compliance risks from Emerging Technology and Infrastructure changes</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Overcome IT Assurance program with Acquire/Merged Organizations</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-74429c5 elementor-widget elementor-widget-heading" data-id="74429c5" data-element_type="widget" data-e-type="widget" id="tprm-grc-enterprise" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">GRC – Enterprise Risk Management</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-37291c1 elementor-widget elementor-widget-heading" data-id="37291c1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys’s Unified Risk Management establishes an effective risk framework across enterprise-wide with standards and methods for risk identification, assessment, management, and reporting while supporting the risk program to meet the critical and unique needs of our clients.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-dc16792 elementor-widget elementor-widget-heading" data-id="dc16792" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys Accelerates a unified risk program, validating current security posture and risk landscape to understand so that we can build and provide secure and reliable solutions that not only saves cost, but time and effort.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-53ddc20 elementor-widget elementor-widget-heading" data-id="53ddc20" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys has also been delivering Cybersecurity and TPRM Advisory services over a decade now. Our team of consultants can quickly Assess and build unified control library while doing Internal risk assessments and Audit assurance services/projects.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-79af753 elementor-widget elementor-widget-heading" data-id="79af753" data-element_type="widget" data-e-type="widget" id="tprm-grc-riskaudit" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">GRC – Risk-Audit Assurance Services</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-7013e3f elementor-widget elementor-widget-heading" data-id="7013e3f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys’s has developed interrelated and unified approach which revolves around Risk-Audit, Compliance, Controls and Assurance Services. We bring in solutions that protect and strengthen every business from people process and technology.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-6412606 elementor-widget elementor-widget-heading" data-id="6412606" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys help clients with the design and implementation of IT risk, Vendor Risk and IT Controls to safeguard businesses involving complex and emerging technologies risk landscape. We help you overcome your challenges and risks as underestimated and undefined in the areas of shadow IT processes.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-4745a6c elementor-widget elementor-widget-heading" data-id="4745a6c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys is prepared and equipped to resolve risks revolving around “Digital Solutions”. Every business prefers automation so that all processes can be aligned without a margin of error. However, if the automation does not meet the logic and the purpose, it would deviate and would result in creating risks that may go un-noticed.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-42c6c5f ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="42c6c5f" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9570417" data-id="9570417" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c161742 elementor-widget elementor-widget-heading" data-id="c161742" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">FAQ</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-758f804 mtx-faq-sec elementor-widget elementor-widget-accordion" data-id="758f804" data-element_type="widget" data-e-type="widget" data-widget_type="accordion.default">
				<div class="elementor-widget-container">
							<div class="elementor-accordion">
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1231" class="elementor-tab-title" data-tab="1" role="button" aria-controls="elementor-tab-content-1231" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-plus"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-minus"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">What is Third Party Risk Management?</a>
					</div>
					<div id="elementor-tab-content-1231" class="elementor-tab-content elementor-clearfix" data-tab="1" role="region" aria-labelledby="elementor-tab-title-1231"><p>Third-Party risk management primary goals is to manage the overall risk associated with conducting business with Client suppliers/vendors by utilizing the following methods:</p><ol><li>Identify, Categorize and Prioritize Third Party/Suppliers/Vendors</li><li>Perform TPRA using Central questionnaire database as available</li><li>Monitor and track identified risks (including periodic re-assessments as needed). This is a part of due diligence process</li><li>Communicate findings to Business owners and Third Party/Supplier/Vendor</li><li>Project Dashboard reporting to the Management</li><li>Reduce Risks to Client and their Customers</li></ol></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1232" class="elementor-tab-title" data-tab="2" role="button" aria-controls="elementor-tab-content-1232" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-plus"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-minus"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">What are some third-party risks?</a>
					</div>
					<div id="elementor-tab-content-1232" class="elementor-tab-content elementor-clearfix" data-tab="2" role="region" aria-labelledby="elementor-tab-title-1232"><ol><li>Vendor/Supplier who handle PII or generally Sensitive Data (ex; Intellectual Property (IP), Financial data, HR application/support vendors, etc.).Vendor/Supplier that develop custom software or hardware for Client/Third-party manufacturing companies</li><li>Vendor/Supplier with access to our network/systems</li><li>Vendor/Supplier performing work at third-party/offshore locations</li><li>Cloud service providers</li><li>Contingent Workforce Suppliers (CWS) and consulting companies</li></ol></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1233" class="elementor-tab-title" data-tab="3" role="button" aria-controls="elementor-tab-content-1233" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-plus"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-minus"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">What is the purpose of third-party risk management program?</a>
					</div>
					<div id="elementor-tab-content-1233" class="elementor-tab-content elementor-clearfix" data-tab="3" role="region" aria-labelledby="elementor-tab-title-1233"><ol><li>Minimize exposure and losses for both Client and our customers</li><li>Ensure our compliance with various regulations and standards such as PCI, GDPR, ISO2700X, NIST, etc.</li><li>Enable the business to make informed decisions</li><li>Tracking and monitoring third-party/suppliers/Vendors, helps mitigate and manage Information Security – privacy related risks. This is important due to risk factors such as:<ul><li>Recent increased threat from hackers, ransomware/malware, and global threat actors</li><li>The proliferation of the use of new, cutting-edge technologies (ex: Cloud)</li><li>New regional laws and regulations based around cybersecurity and data privacy</li></ul></li></ol></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1234" class="elementor-tab-title" data-tab="4" role="button" aria-controls="elementor-tab-content-1234" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-plus"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-minus"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">What is third party risk management framework?</a>
					</div>
					<div id="elementor-tab-content-1234" class="elementor-tab-content elementor-clearfix" data-tab="4" role="region" aria-labelledby="elementor-tab-title-1234"><p>TPRM framework consists of:</p><ol><li>Due-diligence process by providing vendor questionnaires</li><li>Reviewing security responses and mapping to security controls</li><li>Review controls concerning policy, procedure, and standards</li><li>Assessing vendors based on security ratings and external disclosures</li></ol></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1235" class="elementor-tab-title" data-tab="5" role="button" aria-controls="elementor-tab-content-1235" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-plus"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-minus"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">Why is third party risk management (TPRM) important?</a>
					</div>
					<div id="elementor-tab-content-1235" class="elementor-tab-content elementor-clearfix" data-tab="5" role="region" aria-labelledby="elementor-tab-title-1235"><p>Advancement of emerging technologies to meet future demands and scalability has left organizations with challenges on how to address third party risks who acts a key spoke in their technology delivery. Underrated risks arising from Vendors (Third Party) exposes revenue loss.</p><ol><li>Risks over data security and integrity for vendors/Third party’s having remote access within or beyond geographical boundaries</li><li>Risks over vulnerabilities and threat landscape in vendor’s environment and map any dependencies with their sub-contracting parties</li><li>Non-Compliance against Regulatory Audits and compliance attestation and Certification through inadequate assessments and activities performed</li><li>Process not aligned/mapped with different control frameworks. Lack of skilled resource to manage and monitor the risks on vendors/Third Party’s</li><li>Lack of awareness and training in a multi network vendor activity and not limited to scope of policies, process people and technology</li></ol></div>
				</div>
										<script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"FAQPage","mainEntity":[{"@type":"Question","name":"What is Third Party Risk Management?","acceptedAnswer":{"@type":"Answer","text":"<p>Third-Party risk management primary goals is to manage the overall risk associated with conducting business with Client suppliers\/vendors by utilizing the following methods:<\/p><ol><li>Identify, Categorize and Prioritize Third Party\/Suppliers\/Vendors<\/li><li>Perform TPRA using Central questionnaire database as available<\/li><li>Monitor and track identified risks (including periodic re-assessments as needed). This is a part of due diligence process<\/li><li>Communicate findings to Business owners and Third Party\/Supplier\/Vendor<\/li><li>Project Dashboard reporting to the Management<\/li><li>Reduce Risks to Client and their Customers<\/li><\/ol>"}},{"@type":"Question","name":"What are some third-party risks?","acceptedAnswer":{"@type":"Answer","text":"<ol><li>Vendor\/Supplier who handle PII or generally Sensitive Data (ex; Intellectual Property (IP), Financial data, HR application\/support vendors, etc.).Vendor\/Supplier that develop custom software or hardware for Client\/Third-party manufacturing companies<\/li><li>Vendor\/Supplier with access to our network\/systems<\/li><li>Vendor\/Supplier performing work at third-party\/offshore locations<\/li><li>Cloud service providers<\/li><li>Contingent Workforce Suppliers (CWS) and consulting companies<\/li><\/ol>"}},{"@type":"Question","name":"What is the purpose of third-party risk management program?","acceptedAnswer":{"@type":"Answer","text":"<ol><li>Minimize exposure and losses for both Client and our customers<\/li><li>Ensure our compliance with various regulations and standards such as PCI, GDPR, ISO2700X, NIST, etc.<\/li><li>Enable the business to make informed decisions<\/li><li>Tracking and monitoring third-party\/suppliers\/Vendors, helps mitigate and manage Information Security \u2013 privacy related risks. This is important due to risk factors such as:<ul><li>Recent increased threat from hackers, ransomware\/malware, and global threat actors<\/li><li>The proliferation of the use of new, cutting-edge technologies (ex: Cloud)<\/li><li>New regional laws and regulations based around cybersecurity and data privacy<\/li><\/ul><\/li><\/ol>"}},{"@type":"Question","name":"What is third party risk management framework?","acceptedAnswer":{"@type":"Answer","text":"<p>TPRM framework consists of:<\/p><ol><li>Due-diligence process by providing vendor questionnaires<\/li><li>Reviewing security responses and mapping to security controls<\/li><li>Review controls concerning policy, procedure, and standards<\/li><li>Assessing vendors based on security ratings and external disclosures<\/li><\/ol>"}},{"@type":"Question","name":"Why is third party risk management (TPRM) important?","acceptedAnswer":{"@type":"Answer","text":"<p>Advancement of emerging technologies to meet future demands and scalability has left organizations with challenges on how to address third party risks who acts a key spoke in their technology delivery. Underrated risks arising from Vendors (Third Party) exposes revenue loss.<\/p><ol><li>Risks over data security and integrity for vendors\/Third party\u2019s having remote access within or beyond geographical boundaries<\/li><li>Risks over vulnerabilities and threat landscape in vendor\u2019s environment and map any dependencies with their sub-contracting parties<\/li><li>Non-Compliance against Regulatory Audits and compliance attestation and Certification through inadequate assessments and activities performed<\/li><li>Process not aligned\/mapped with different control frameworks. Lack of skilled resource to manage and monitor the risks on vendors\/Third Party\u2019s<\/li><li>Lack of awareness and training in a multi network vendor activity and not limited to scope of policies, process people and technology<\/li><\/ol>"}}]}</script>
					</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>An escalation of Conti ransomware attacks 2021 – Double Extortion Ransomware</title>
		<link>https://mapgenesys.com/double-extortion-ransomware/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Fri, 13 May 2022 11:02:30 +0000</pubDate>
				<category><![CDATA[Malwares]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1920</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1920" class="elementor elementor-1920">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-5981398 elementor-section-content-middle ct-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5981398" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69d5360" data-id="69d5360" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8c02f17 elementor-widget elementor-widget-heading" data-id="8c02f17" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">CISA, the FBI, and the NSA have issued a warning to US organizations around increased attacks from the Conti Ransomware.</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-7c894d3 elementor-widget elementor-widget-heading" data-id="7c894d3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">With the disappearance of <a href="https://mapgenesys.com/revil-ransomware-attack/" target="_blank">REvil</a> earlier this year, many affiliates shifted strains, with Conti being one of the popular variants adopted by these criminals, explaining this rapid increase in attack attempts, with the FBI confirming that they have witnessed at least 400 individual attacks against domestic and foreign institutions. Conti ransomware uses the MITRE ATT&amp;CK techniques, and in typical Conti ransomware attacks, malicious cyber actors steal files, encrypt servers and workstations, and demand a ransom payment.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-1775f7c elementor-widget elementor-widget-heading" data-id="1775f7c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>This year Conti successfully disseminated a huge attack against Ireland’s Health Service Executive (HSE) and Department of Health (DoH),</b> one which demanded $20 million, and Irelands Health Service is still recovering from this. The FBI has confirmed that healthcare continues to be one of the most targeted sectors amongst Conti’s attack efforts.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-e5813b1 elementor-widget elementor-widget-heading" data-id="e5813b1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Here we have yet another sophisticated and successful ransomware-as-a-service (RaaS) strain operating out of Russia. Conti is a strain known to exploit legitimate remote monitoring and management software and remote desktop software as backdoors, to maintain persistence on victim networks. Legitimate tools such as Sysinternals and Mimikatz are then utilized on the victim’s network to obtain credentials and escalate privileges, before moving laterally across the network and deploying the Conti malware.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c947b4c ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="c947b4c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06bf99a" data-id="06bf99a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-61892b3 elementor-widget elementor-widget-heading" data-id="61892b3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Ransomware places customer call centers on hold.</b> A Conti ransomware attack on GSS, the Spanish and Latin America division of Covisian, leading European customer care and call center provider, has locked up its IT systems and disrupted call center operations of companies like Vodafone Spain, Madrid’s water supplier, and television stations. Details are few, but the Record by Recorded Future notes that GSS described the incident as “inevitable/unavoidable.”</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c3c7f27 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="c3c7f27" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-99c95b4" data-id="99c95b4" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3cca6ec elementor-widget elementor-widget-heading" data-id="3cca6ec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">What happens with the attack?</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-76a5e9a elementor-widget elementor-widget-text-editor" data-id="76a5e9a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">Ransomware gangs actively look for and prey on victims who are using legacy cybersecurity products. These solutions typically have a difficult time keeping up with modern sophisticated attacks due to their model of requiring a sample of the malware before being able to create signatures that guard against it.</span>								</div>
				</div>
				<div class="elementor-element elementor-element-db7beb2 elementor-widget elementor-widget-text-editor" data-id="db7beb2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">Like many other ransomware gangs, Conti completely removes the volume of shadow copy files on a system – making simple restoration impossible.</span>								</div>
				</div>
				<div class="elementor-element elementor-element-474d39d elementor-widget elementor-widget-text-editor" data-id="474d39d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">In May, the Federal Bureau of Investigation (FBI) revealed that the Conti ransomware gang has hit at least 16 healthcare and first responder organizations.</span>								</div>
				</div>
				<div class="elementor-element elementor-element-b853a04 elementor-widget elementor-widget-text-editor" data-id="b853a04" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">In August, an affiliate of the Conti RaaS has leaked the training material provided by the group to the customers of its RaaS, he also published the info about one of the operators.</span>								</div>
				</div>
				<div class="elementor-element elementor-element-eaca0c2 elementor-widget elementor-widget-text-editor" data-id="eaca0c2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">The Conti Ransomware operators offer their services to their affiliates and maintain 20-30% of each ransom payment.</span>								</div>
				</div>
				<div class="elementor-element elementor-element-e9e3977 elementor-widget elementor-widget-text-editor" data-id="e9e3977" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">The affiliate leaked the IP addresses for Cobalt Strike C2 servers and an archive of 113 MB that includes training material and tools shared by the Conti operators with its network to conduct ransomware attacks.</span>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-8315329 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="8315329" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d387267" data-id="d387267" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-78964e5 elementor-widget elementor-widget-heading" data-id="78964e5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">More Technical Details</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-0383c55 elementor-widget elementor-widget-heading" data-id="0383c55" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">While Conti is considered a ransomware-as-a-service (RaaS) model ransomware variant, there is variation in its structure that differentiates it from a typical affiliate model. Conti developers likely pay the deployers of the ransomware a wage rather than a percentage of the proceeds used by affiliate cyber actors and receive a share of the proceeds from a successful attack. </p>				</div>
				</div>
				<div class="elementor-element elementor-element-1aaae6c elementor-widget elementor-widget-heading" data-id="1aaae6c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Conti actors often gain initial access [TA0001] to networks through:</p>				</div>
				</div>
				<div class="elementor-element elementor-element-a9431b6 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="a9431b6" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Spearphishing campaigns using tailored emails that contain malicious attachments [T1566.001] or malicious links [T1566.002];</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-8a1bfc7 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="8a1bfc7" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-chevron-right"></i>						</span>
										<span class="elementor-icon-list-text">Malicious Word attachments often contain embedded scripts that can be used to download or drop other malware—such as TrickBot and IcedID, and/or Cobalt Strike—to assist with lateral movement and later stages of the attack life cycle with the eventual goal of deploying Conti ransomware.</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-2412420 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="2412420" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Stolen or weak Remote Desktop Protocol (RDP) credentials [T1078].</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Phone calls;</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Fake software promoted via search engine optimization;</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Other malware distribution networks (e.g., ZLoader); and</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Common vulnerabilities in external assets.</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-6854118 elementor-widget elementor-widget-heading" data-id="6854118" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Conti actors often use the open-source Rclone command-line program for data exfiltration [TA0010]. After the actors steal and encrypt the victim's sensitive data [T1486], they employ a double extortion technique in which they demand the victim pay a ransom for the release of the encrypted data and threaten the victim with the public release of the data if the ransom is not paid.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-9c22c80 elementor-widget elementor-widget-heading" data-id="9c22c80" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Ref:</b> <a href="https://us-cert.cisa.gov/" style="color: #f15725">https://us-cert.cisa.gov/</a> </p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-453a1c6 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="453a1c6" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1171fff" data-id="1171fff" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-4880b63 elementor-widget elementor-widget-heading" data-id="4880b63" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">The advisory published by various US agencies and to secure our client’s environment mapgenesys suggest you with the following mitigations:</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-5e4be00 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5e4be00" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7fa68ad" data-id="7fa68ad" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-54dd34e mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="54dd34e" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Use multi-factor authentication to remotely access networks from external sources.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Implement network segmentation and filter traffic. Implement and ensure robust network segmentation between networks and functions to reduce the spread of ransomware. Define a demilitarized zone that eliminates unregulated communication between networks.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Implement a URL blocklist and/or allowlist to prevent users from accessing malicious websites.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Scan for vulnerabilities and keep software updated. Set antivirus/antimalware programs to conduct regular scans of network assets using up-to-date signatures.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Upgrade software and operating systems, applications, and firmware on network assets promptly. Consider using a centralized patch management system.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Remove unnecessary applications and apply controls. Conti threat actors leverage legitimate applications—such as remote monitoring and management software and remote desktop software applications—to aid in the malicious exploitation of an organization’s enterprise.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Implement endpoint and detection response tools. Endpoint and detection response tools allow a high degree of visibility into the security status of endpoints and can help effectively protect against malicious cyber actors.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Limit access to resources over the network, especially by restricting RDP.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Secure user accounts. Regularly audit logs to ensure new accounts are legitimate users.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Use the Ransomware Response Checklist in case of infection.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-dbf306b ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="dbf306b" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0faee37" data-id="0faee37" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5c4cb91 elementor-widget elementor-widget-heading" data-id="5c4cb91" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b style="color: #F15725">If you’re battling this or a similar threat, you’ve come to the right place.</b> The mapgenesys Incident Response team is made up of world-class consultants dedicated to handling response and containment services for a wide range of incidents, including ransomware and Advanced Persistent Threat (APT) cases.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-fc8f515 elementor-widget elementor-widget-heading" data-id="fc8f515" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Based on different techniques used by the attackers, we have different processes to help our customers secure their organizations mapgenesys's endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection, and response (EDR), and remote access VPN solutions.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-ab6d421 elementor-widget elementor-widget-heading" data-id="ab6d421" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">We have a global consulting team standing by to assist you in providing around-the-clock support, where required, as well as local assistance. Please contact us here: <a href="https://mapgenesys.com/contact-us/" style="color: #f15725">https://mapgenesys.com/contact-us/</a></p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exploiting recent patches: Zero-Day Vulnerability in MSHTML (CVE-2021-40444)</title>
		<link>https://mapgenesys.com/exploiting-recent-patches-zero-day-vulnerability-in-mshtml-cve-2021-40444/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Fri, 13 May 2022 09:32:29 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1908</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1908" class="elementor elementor-1908">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-9f1d65e elementor-section-content-middle ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="9f1d65e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa2dab9" data-id="fa2dab9" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b6ce83a elementor-widget elementor-widget-heading" data-id="b6ce83a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Microsoft released an advisory on a zero-day (CVE-2021-40444) vulnerability in Microsoft MSHTML that adversaries are actively exploiting through Microsoft Office documents. According to the company, this vulnerability has already been used in targeted attacks against Microsoft Office users. In an attempt to exploit this vulnerability, attackers create a document with a specially crafted object. If a user opens the document, MS Office will download and execute a malicious script.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-259a98d elementor-widget elementor-widget-heading" data-id="259a98d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Is Protected View Defended the attacks?</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-5f681d9 elementor-widget elementor-widget-heading" data-id="5f681d9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Even though Microsoft stated that Office opens documents from the internet in Protected View or Application Guard for Office, both of which prevent the current attack, the RTF attack vector is still open for exploitation. Adversaries can use several other bypasses for Protected View. Regardless, administrators should ensure they have Protected View enabled. Microsoft has provided workarounds as temporary mitigation until they release a patch.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-cc1eeb6 elementor-widget elementor-widget-heading" data-id="cc1eeb6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">The same attacks are still happening all over the world. We are currently seeing attempts to exploit the CVE-2021-40444 vulnerability targeting companies in various sectors includes the research and development sector, the energy sector, large industrial sectors, banking, medical technology development sectors, telecommunications, and the IT sector.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-27a6616 elementor-widget elementor-widget-heading" data-id="27a6616" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Microsoft has stated that both Microsoft Defender Antivirus and Microsoft Defender for Endpoint detect malicious files as long as the definitions are up-to-date. Organizations using only Microsoft Defender for Endpoint should ensure that they have placed their EDR in block mode.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c9e156d ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="c9e156d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-480de40" data-id="480de40" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-92d9b22 elementor-widget elementor-widget-image" data-id="92d9b22" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
											<a href="https://owasp.org/Top10/%20">
							<img decoding="async" width="1033" height="460" src="https://mapgenesys.com/wp-content/uploads/2022/05/zero-day-vulnerability-img1-comp.png" class="attachment-full size-full wp-image-1910" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/zero-day-vulnerability-img1-comp.png 1033w, https://mapgenesys.com/wp-content/uploads/2022/05/zero-day-vulnerability-img1-comp-300x134.png 300w, https://mapgenesys.com/wp-content/uploads/2022/05/zero-day-vulnerability-img1-comp-1024x456.png 1024w, https://mapgenesys.com/wp-content/uploads/2022/05/zero-day-vulnerability-img1-comp-768x342.png 768w" sizes="(max-width: 1033px) 100vw, 1033px" />								</a>
											<figcaption class="widget-image-caption wp-caption-text"><b>Ref:</b> https://securityaffairs.co/</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-2a21a6f ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="2a21a6f" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-776d2b1" data-id="776d2b1" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-203e1cf elementor-widget elementor-widget-heading" data-id="203e1cf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Technical details</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-508cc20 elementor-widget elementor-widget-text-editor" data-id="508cc20" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">The remote code execution vulnerability CVE-2021-40444 was found in MSHTML, the Internet Explorer browser engine which is a component of modern Windows systems, both user and server. Moreover, the engine is often used by other programs to work with web content (e.g. MS Word or MS PowerPoint).</span>								</div>
				</div>
				<div class="elementor-element elementor-element-fd37b11 elementor-widget elementor-widget-text-editor" data-id="fd37b11" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">In order to exploit the vulnerability, attackers embed a special object in a Microsoft Office document containing an URL for a malicious script. If a victim opens the document, Microsoft Office will download the malicious script from the URL and run it using the MSHTML engine. Then the script can use ActiveX controls to perform malicious actions on the victim’s computer. For example, the original zero-day exploit which was used in targeted attacks at the time of detection used ActiveX controls to download and execute a Cobalt Strike payload. We are currently seeing various types of malware, mostly backdoors, which are delivered by exploiting the CVE-2021-40444 vulnerability.</span>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-fa0d24f ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="fa0d24f" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-582b7bb" data-id="582b7bb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-52963be elementor-widget elementor-widget-heading" data-id="52963be" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Endpoint detection and response (EDR)</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-e5c149d elementor-widget elementor-widget-heading" data-id="e5c149d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Alerts with the following titles in the security center can indicate threat activity on your network:</p>				</div>
				</div>
				<div class="elementor-element elementor-element-e7ff52a mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="e7ff52a" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Possible exploitation of CVE-2021-40444 (requires Defender Antivirus as the Active AV) The following alerts might also indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and are not monitored in the status cards provided with this report.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Suspicious Behavior By Office Application (detects the anomalous process launches that happen in exploitation of this CVE, and other malicious behavior)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Suspicious use of Control Panel item</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c202b92 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="c202b92" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb0c7bd" data-id="bb0c7bd" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-fe59750 elementor-widget elementor-widget-heading" data-id="fe59750" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Mitigations</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-8ff8139 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="8ff8139" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Turn on cloud-delivered protection to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block the majority of new and unknown variants.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Use the latest Threat Intelligence information to keep up to date with TTPs used by threat actors.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Businesses should use a security solution that provides vulnerability, patch management, and exploit prevention components, such as the Automatic Exploit Prevention component in Kaspersky Endpoint Security for Business. The component monitors suspicious actions in applications and blocks malicious file execution.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Use solutions like mapgenesys <a href="https://mapgenesys.com/mdr-as-a-service/" target="_blank">MDR-as-a-service</a> and our <a href="https://mapgenesys.com/built-to-suit-services/" target="_blank">Built to Suit Services</a>  service, which helps identify and stop an attack at an early stage before the attackers achieve their final goal.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">mapgenesys Solutioning teams help you with pre-implementation discovery, planning, design activities, and execution in the “Outcome-based - Built to Suit Services” model.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-089ff7c ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="089ff7c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-382d3ed" data-id="382d3ed" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8c38b97 elementor-widget elementor-widget-heading" data-id="8c38b97" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Preventing Exploit with mapgenesys’s EndPoint Security</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-8748b66 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8748b66" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-08a6fe0" data-id="08a6fe0" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-90502a3 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="90502a3" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Based on different techniques used by the attackers, we have different processes to help our customers secure their organizations mapgenesys's endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection, and response (EDR), and remote access VPN solutions.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">In addition to Incident response, vulnerability management, and various other security services, we provide threat hunting that exposes the Advanced Persistent Threats (APTs) and potential risks along with Machine-learning classification to detect zero-day threats in near real-time.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Centralized endpoint management platform for greater visibility and simplify operations</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-ecb60be ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="ecb60be" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb8fa67" data-id="cb8fa67" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-0331c24 elementor-widget elementor-widget-heading" data-id="0331c24" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">We advise administrators to perform an enterprise-wide IoC sweep to check if their organizations have been targeted. mapgenesys is aware of targeted attacks using CVE-2021-40444, and our products protect against attacks leveraging the vulnerability. On September 7, 2021, Microsoft shared a partial workaround for the flaw, and only in 24 hours, they observed a rise in exploitation attempts within. Since no patch is yet available and bypasses are available for the mitigations, enterprise defenders must remain vigilant and proactively hunt for threats in their network.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OWASP Top 10 2021 release shakes up Web App Threat Categories</title>
		<link>https://mapgenesys.com/owasp-shakes-up-web-app-threat-categories-with-release-of-draft-top-10/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Thu, 12 May 2022 12:30:55 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1864</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1864" class="elementor elementor-1864">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-0c763f7 elementor-section-content-middle ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="0c763f7" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-22ce141" data-id="22ce141" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-0b60444 elementor-widget elementor-widget-heading" data-id="0b60444" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">The latest installment of <b>The OWASP Top 10 2021-</b> a list of the most dangerous web vulnerabilities, has been updated after four years, and, after more than a decade, there is a new vulnerability at the top of the ranking.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-053ade5 elementor-widget elementor-widget-heading" data-id="053ade5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Created in the mid-2000s, the list is curated by the Open Web Application Security Project, a nonprofit foundation that’s made up of security experts from around the world to evaluate the importance and severity of vulnerabilities in web-based apps.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-f3b32bf elementor-widget elementor-widget-heading" data-id="f3b32bf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><i>For example,</i> bug bounty platforms use the OWASP Top 10 list to classify bugs that need to be patched right away or deserve higher monetary rewards.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-707fb10 elementor-widget elementor-widget-heading" data-id="707fb10" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Because the web programming landscape and its applications are constantly evolving as new programming languages and techniques are incorporated, OWASP experts usually get together once every three-four years to update the Top 10 ranking, moving entries in or out and up and down the list to reflect the current web app ecosystem.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-15a0272 elementor-widget elementor-widget-heading" data-id="15a0272" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">The ranking was updated the last time in November 2017.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-f8fc113 elementor-widget elementor-widget-heading" data-id="f8fc113" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">But last week, the OWASP team released its upcoming list, one that comes with a complete shake-up and even a new leader.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-eb3b1f2 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="eb3b1f2" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5df2626" data-id="5df2626" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e0e79ea elementor-widget elementor-widget-image" data-id="e0e79ea" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
											<a href="https://owasp.org/Top10/%20">
							<img loading="lazy" decoding="async" width="1536" height="423" src="https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img1-comp.png" class="attachment-full size-full wp-image-1895" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img1-comp.png 1536w, https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img1-comp-300x83.png 300w, https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img1-comp-1024x282.png 1024w, https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img1-comp-768x212.png 768w" sizes="(max-width: 1536px) 100vw, 1536px" />								</a>
											<figcaption class="widget-image-caption wp-caption-text"><b>Ref:</b> https://owasp.org/Top10/ </figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-7e97a38 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="7e97a38" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ab3e57" data-id="9ab3e57" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a1390c8 elementor-widget elementor-widget-heading" data-id="a1390c8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">OWASP Top 10: The full list</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-0cc31ff mtx-owasp-accordion elementor-widget elementor-widget-accordion" data-id="0cc31ff" data-element_type="widget" data-e-type="widget" data-widget_type="accordion.default">
				<div class="elementor-widget-container">
							<div class="elementor-accordion">
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1331" class="elementor-tab-title" data-tab="1" role="button" aria-controls="elementor-tab-content-1331" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A01:2021-Broken Access Control</a>
					</div>
					<div id="elementor-tab-content-1331" class="elementor-tab-content elementor-clearfix" data-tab="1" role="region" aria-labelledby="elementor-tab-title-1331"><p><strong>2021-Broken Access Control</strong> moves up from the fifth position; 94% of applications were tested for some form of broken access control. The 34 CWEs mapped to Broken Access Control had more occurrences in applications than any other category.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1332" class="elementor-tab-title" data-tab="2" role="button" aria-controls="elementor-tab-content-1332" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A02:2021-Cryptographic Failures</a>
					</div>
					<div id="elementor-tab-content-1332" class="elementor-tab-content elementor-clearfix" data-tab="2" role="region" aria-labelledby="elementor-tab-title-1332"><p><strong>2021-Cryptographic Failures</strong> shift up one position to #2, previously known as <em>Sensitive Data Exposure,</em> which was a broad symptom rather than a root cause. The renewed focus here is on failures related to cryptography which often leads to sensitive data exposure or system compromise.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1333" class="elementor-tab-title" data-tab="3" role="button" aria-controls="elementor-tab-content-1333" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A03:2021-Injection</a>
					</div>
					<div id="elementor-tab-content-1333" class="elementor-tab-content elementor-clearfix" data-tab="3" role="region" aria-labelledby="elementor-tab-title-1333"><p><strong>2021-Injection</strong> slides down to the third position. 94% of the applications were tested for some form of injection, and the 33 CWEs mapped into this category have the second most occurrences in applications. Cross-site Scripting is now part of this category in this edition.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1334" class="elementor-tab-title" data-tab="4" role="button" aria-controls="elementor-tab-content-1334" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A04:2021-Insecure Design</a>
					</div>
					<div id="elementor-tab-content-1334" class="elementor-tab-content elementor-clearfix" data-tab="4" role="region" aria-labelledby="elementor-tab-title-1334"><p><strong>2021-Insecure Design</strong> is a new category for 2021, with a focus on risks related to design flaws. If we genuinely want to &#8220;move left&#8221; as an industry, it calls for more use of threat modeling, secure design patterns and principles, and reference architectures.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1335" class="elementor-tab-title" data-tab="5" role="button" aria-controls="elementor-tab-content-1335" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A05:2021-Security Misconfiguration</a>
					</div>
					<div id="elementor-tab-content-1335" class="elementor-tab-content elementor-clearfix" data-tab="5" role="region" aria-labelledby="elementor-tab-title-1335"><p><strong>2021-Security Misconfiguration</strong> moves up from #6 in the previous edition; 90% of applications were tested for some form of misconfiguration. With more shifts into highly configurable software, it&#8217;s not surprising to see this category move up. The former category for XML External Entities (XXE) is now part of this category.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1336" class="elementor-tab-title" data-tab="6" role="button" aria-controls="elementor-tab-content-1336" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A06:2021-Vulnerable and Outdated Components</a>
					</div>
					<div id="elementor-tab-content-1336" class="elementor-tab-content elementor-clearfix" data-tab="6" role="region" aria-labelledby="elementor-tab-title-1336"><p><strong>2021-Vulnerable and Outdated Components</strong> was previously titled <em>Using Components with Known Vulnerabilities</em> and is #2 in the industry survey, but also had enough data to make the Top 10 via data analysis. This category moves up from #9 in 2017 and is a known issue that we struggle to test and assess risk. It is the only category not to have any CVEs mapped to the included CWEs, so a default exploit and impact weights of 5.0 are factored into their scores.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1337" class="elementor-tab-title" data-tab="7" role="button" aria-controls="elementor-tab-content-1337" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A07:2021-Identification and Authentication Failures</a>
					</div>
					<div id="elementor-tab-content-1337" class="elementor-tab-content elementor-clearfix" data-tab="7" role="region" aria-labelledby="elementor-tab-title-1337"><p><strong>2021-Identification and Authentication Failures</strong> was previously <em>Broken Authentication</em> and is sliding down from the second position, and now include CWEs that are more related to identification failures. This category is still an integral part of the Top 10, but the increased availability of standardized frameworks seems to be helping.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1338" class="elementor-tab-title" data-tab="8" role="button" aria-controls="elementor-tab-content-1338" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A08:2021-Software and Data Integrity Failures</a>
					</div>
					<div id="elementor-tab-content-1338" class="elementor-tab-content elementor-clearfix" data-tab="8" role="region" aria-labelledby="elementor-tab-title-1338"><p><strong>2021-Software and Data Integrity Failures</strong> is a new category for 2021, focusing on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. One of the highest weighted impacts from CVE/CVSS data mapped to the 10 CWEs in this category. Insecure Deserialization from 2017 is now a part of this larger category.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-1339" class="elementor-tab-title" data-tab="9" role="button" aria-controls="elementor-tab-content-1339" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A09:2021-Security Logging and Monitoring Failures</a>
					</div>
					<div id="elementor-tab-content-1339" class="elementor-tab-content elementor-clearfix" data-tab="9" role="region" aria-labelledby="elementor-tab-title-1339"><p><strong>2021-Security Logging and Monitoring Failures</strong> was previously <em>Insufficient Logging &amp;</em> Monitoring and is added from the industry survey (#3), moving up from #10 previously. This category is expanded to include more types of failures, is challenging to test for, and isn&#8217;t well represented in the CVE/CVSS data. However, failures in this category can directly impact visibility, incident alerting, and forensics.</p></div>
				</div>
							<div class="elementor-accordion-item">
					<div id="elementor-tab-title-13310" class="elementor-tab-title" data-tab="10" role="button" aria-controls="elementor-tab-content-13310" aria-expanded="false">
													<span class="elementor-accordion-icon elementor-accordion-icon-left" aria-hidden="true">
															<span class="elementor-accordion-icon-closed"><i class="fas fa-angle-right"></i></span>
								<span class="elementor-accordion-icon-opened"><i class="fas fa-angle-down"></i></span>
														</span>
												<a class="elementor-accordion-title" tabindex="0">A10:2021-Server-Side Request Forgery</a>
					</div>
					<div id="elementor-tab-content-13310" class="elementor-tab-content elementor-clearfix" data-tab="10" role="region" aria-labelledby="elementor-tab-title-13310"><p><strong>2021-Server-Side Request Forgery</strong> is added from the industry survey (#1). The data shows a relatively low incidence rate with above average testing coverage, along with above-average ratings for Exploit and Impact potential. This category represents the scenario where the industry professionals are telling us this is important, even though it&#8217;s not illustrated in the data at this time.</p></div>
				</div>
								</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-ba7af4e ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="ba7af4e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c608f8d" data-id="c608f8d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3c1f888 elementor-widget elementor-widget-heading" data-id="3c1f888" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">2021</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-654006a elementor-widget elementor-widget-text-editor" data-id="654006a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Access Control</p>								</div>
				</div>
				<div class="elementor-element elementor-element-aa2460a elementor-widget elementor-widget-text-editor" data-id="aa2460a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cryptographic Failures</p>								</div>
				</div>
				<div class="elementor-element elementor-element-c66936a elementor-widget elementor-widget-text-editor" data-id="c66936a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Injection</p>								</div>
				</div>
				<div class="elementor-element elementor-element-c2e3b8f elementor-widget elementor-widget-text-editor" data-id="c2e3b8f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Design</p>								</div>
				</div>
				<div class="elementor-element elementor-element-664d6dc elementor-widget elementor-widget-text-editor" data-id="664d6dc" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Security Misconfiguration</p>								</div>
				</div>
				<div class="elementor-element elementor-element-2f1e2e0 elementor-widget elementor-widget-text-editor" data-id="2f1e2e0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Vulnerable and Outdated Components</p>								</div>
				</div>
				<div class="elementor-element elementor-element-ab46969 elementor-widget elementor-widget-text-editor" data-id="ab46969" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Identification and Authentication Failures</p>								</div>
				</div>
				<div class="elementor-element elementor-element-276bdd3 elementor-widget elementor-widget-text-editor" data-id="276bdd3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Software and Data Integrity Failures</p>								</div>
				</div>
				<div class="elementor-element elementor-element-d6393c1 elementor-widget elementor-widget-text-editor" data-id="d6393c1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Security Logging and Monitoring Failures</p>								</div>
				</div>
				<div class="elementor-element elementor-element-534271e elementor-widget elementor-widget-text-editor" data-id="534271e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Server-Side Request Forgery</p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-eae16b2" data-id="eae16b2" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-44ed0a3 elementor-widget elementor-widget-heading" data-id="44ed0a3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">2017</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-8eb7aba elementor-widget elementor-widget-text-editor" data-id="8eb7aba" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Injection</p>								</div>
				</div>
				<div class="elementor-element elementor-element-3a35197 elementor-widget elementor-widget-text-editor" data-id="3a35197" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Authentication</p>								</div>
				</div>
				<div class="elementor-element elementor-element-351b779 elementor-widget elementor-widget-text-editor" data-id="351b779" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Sensitive Data Exposure</p>								</div>
				</div>
				<div class="elementor-element elementor-element-5360eb8 elementor-widget elementor-widget-text-editor" data-id="5360eb8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>XML External Entities (XXE)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-8a84def elementor-widget elementor-widget-text-editor" data-id="8a84def" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Access Control</p>								</div>
				</div>
				<div class="elementor-element elementor-element-691e575 elementor-widget elementor-widget-text-editor" data-id="691e575" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Security Misconfiguration</p>								</div>
				</div>
				<div class="elementor-element elementor-element-da9fdc1 elementor-widget elementor-widget-text-editor" data-id="da9fdc1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross-Site Scripting (XSS)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-98faff5 elementor-widget elementor-widget-text-editor" data-id="98faff5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Deserialization</p>								</div>
				</div>
				<div class="elementor-element elementor-element-19bb778 elementor-widget elementor-widget-text-editor" data-id="19bb778" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Using Components with Known Vulnerabilities</p>								</div>
				</div>
				<div class="elementor-element elementor-element-441d7e2 elementor-widget elementor-widget-text-editor" data-id="441d7e2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insufficient Logging &amp; Monitoring</p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-444076d" data-id="444076d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-51fc399 elementor-widget elementor-widget-heading" data-id="51fc399" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">2013</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-b731b21 elementor-widget elementor-widget-text-editor" data-id="b731b21" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Injection</p>								</div>
				</div>
				<div class="elementor-element elementor-element-d66d626 elementor-widget elementor-widget-text-editor" data-id="d66d626" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Authentication and Session Management</p>								</div>
				</div>
				<div class="elementor-element elementor-element-9a4ebb0 elementor-widget elementor-widget-text-editor" data-id="9a4ebb0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross-Site Scripting (XSS)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-88060cd elementor-widget elementor-widget-text-editor" data-id="88060cd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Direct Object References</p>								</div>
				</div>
				<div class="elementor-element elementor-element-1ff1415 elementor-widget elementor-widget-text-editor" data-id="1ff1415" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Security Misconfiguration</p>								</div>
				</div>
				<div class="elementor-element elementor-element-da8d0db elementor-widget elementor-widget-text-editor" data-id="da8d0db" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Sensitive Data Exposure</p>								</div>
				</div>
				<div class="elementor-element elementor-element-81bc905 elementor-widget elementor-widget-text-editor" data-id="81bc905" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Missing Function Level Access Control</p>								</div>
				</div>
				<div class="elementor-element elementor-element-65b282e elementor-widget elementor-widget-text-editor" data-id="65b282e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross-Site Request Forgery (CSRF)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-bdc70da elementor-widget elementor-widget-text-editor" data-id="bdc70da" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Using Components with Known Vulnerabilities</p>								</div>
				</div>
				<div class="elementor-element elementor-element-6e42168 elementor-widget elementor-widget-text-editor" data-id="6e42168" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Unvalidated Redirects and Forwards</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e6c8eca ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="e6c8eca" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e64f2d7" data-id="e64f2d7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-45f8a68 elementor-widget elementor-widget-heading" data-id="45f8a68" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">2010</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-92a0346 elementor-widget elementor-widget-text-editor" data-id="92a0346" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Unvalidated Redirects and Forwards</p>								</div>
				</div>
				<div class="elementor-element elementor-element-9dcaae9 elementor-widget elementor-widget-text-editor" data-id="9dcaae9" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross-Site Scripting (XSS)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-25fc285 elementor-widget elementor-widget-text-editor" data-id="25fc285" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Authentication and Session Management</p>								</div>
				</div>
				<div class="elementor-element elementor-element-7580899 elementor-widget elementor-widget-text-editor" data-id="7580899" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Direct Object References</p>								</div>
				</div>
				<div class="elementor-element elementor-element-af6d45f elementor-widget elementor-widget-text-editor" data-id="af6d45f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross-Site Request Forgery (CSRF)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-bcab58c elementor-widget elementor-widget-text-editor" data-id="bcab58c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Security Misconfiguration</p>								</div>
				</div>
				<div class="elementor-element elementor-element-c25635a elementor-widget elementor-widget-text-editor" data-id="c25635a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Cryptographic Storage</p>								</div>
				</div>
				<div class="elementor-element elementor-element-5291845 elementor-widget elementor-widget-text-editor" data-id="5291845" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Failure to Restrict URL Access</p>								</div>
				</div>
				<div class="elementor-element elementor-element-1540dd0 elementor-widget elementor-widget-text-editor" data-id="1540dd0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insufficient Transport Layer Protection</p>								</div>
				</div>
				<div class="elementor-element elementor-element-705ebc6 elementor-widget elementor-widget-text-editor" data-id="705ebc6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Unvalidated Redirects and Forwards</p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-96cf5be" data-id="96cf5be" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f25ac82 elementor-widget elementor-widget-heading" data-id="f25ac82" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">2007</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-5a02c27 elementor-widget elementor-widget-text-editor" data-id="5a02c27" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross-Site Scripting (XSS)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-fef922a elementor-widget elementor-widget-text-editor" data-id="fef922a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Injection Flaws</p>								</div>
				</div>
				<div class="elementor-element elementor-element-05496d4 elementor-widget elementor-widget-text-editor" data-id="05496d4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Malicious File Execution</p>								</div>
				</div>
				<div class="elementor-element elementor-element-50ad715 elementor-widget elementor-widget-text-editor" data-id="50ad715" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Direct Object Reference</p>								</div>
				</div>
				<div class="elementor-element elementor-element-0ccfb8b elementor-widget elementor-widget-text-editor" data-id="0ccfb8b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross-Site Request Forgery (CSRF)</p>								</div>
				</div>
				<div class="elementor-element elementor-element-69d5e86 elementor-widget elementor-widget-text-editor" data-id="69d5e86" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Information Leakage and Improper Error Handling</p>								</div>
				</div>
				<div class="elementor-element elementor-element-f5040d2 elementor-widget elementor-widget-text-editor" data-id="f5040d2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Authentication and Session Management</p>								</div>
				</div>
				<div class="elementor-element elementor-element-70f9cdd elementor-widget elementor-widget-text-editor" data-id="70f9cdd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Cryptographic Storage</p>								</div>
				</div>
				<div class="elementor-element elementor-element-d33734a elementor-widget elementor-widget-text-editor" data-id="d33734a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Communications</p>								</div>
				</div>
				<div class="elementor-element elementor-element-497677d elementor-widget elementor-widget-text-editor" data-id="497677d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Failure to Restrict URL Access</p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-67d1bbf" data-id="67d1bbf" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-cb091fc elementor-widget elementor-widget-heading" data-id="cb091fc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">2004</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-30f97b3 elementor-widget elementor-widget-text-editor" data-id="30f97b3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Unvalidated Input</p>								</div>
				</div>
				<div class="elementor-element elementor-element-d2a2fa5 elementor-widget elementor-widget-text-editor" data-id="d2a2fa5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Access Control</p>								</div>
				</div>
				<div class="elementor-element elementor-element-09e659d elementor-widget elementor-widget-text-editor" data-id="09e659d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Broken Authentication and Session Management</p>								</div>
				</div>
				<div class="elementor-element elementor-element-9473069 elementor-widget elementor-widget-text-editor" data-id="9473069" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cross Site Scripting</p>								</div>
				</div>
				<div class="elementor-element elementor-element-7898f9c elementor-widget elementor-widget-text-editor" data-id="7898f9c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Buffer Overflow</p>								</div>
				</div>
				<div class="elementor-element elementor-element-76c7393 elementor-widget elementor-widget-text-editor" data-id="76c7393" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Injection Flaws</p>								</div>
				</div>
				<div class="elementor-element elementor-element-caab4b8 elementor-widget elementor-widget-text-editor" data-id="caab4b8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Improper Error Handling</p>								</div>
				</div>
				<div class="elementor-element elementor-element-6930f4d elementor-widget elementor-widget-text-editor" data-id="6930f4d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Storage</p>								</div>
				</div>
				<div class="elementor-element elementor-element-36442ea elementor-widget elementor-widget-text-editor" data-id="36442ea" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Application Denial of Service</p>								</div>
				</div>
				<div class="elementor-element elementor-element-c3ee2f3 elementor-widget elementor-widget-text-editor" data-id="c3ee2f3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Insecure Configuration Management</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-22b714c ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="22b714c" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-761a5f9" data-id="761a5f9" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2a11a2f elementor-widget elementor-widget-heading" data-id="2a11a2f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Analysis: OWASP shifts left</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-7e733a4 elementor-widget elementor-widget-text-editor" data-id="7e733a4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 14pt;">The 2021 ranking is also the first time since 2007 that the “Injection” vulnerability category has not been at the top of the ranking. Instead of old risks going away, OWASP has consolidated existing risks into several categories and new risks have been added, reflecting the increased threats facing web applications. For the 2021 list, OWASP added three new categories: ‘Insecure Design’,</span></p>								</div>
				</div>
				<div class="elementor-element elementor-element-35059ac elementor-widget elementor-widget-text-editor" data-id="35059ac" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt;">The reason for this is because web apps are getting more and more complex, and oftentimes, they are just a collection of APIs, with their own set of configuration options that, when combined, leave the door open for misconfigurations, unprotected endpoints, or unforeseen interactions.</span>								</div>
				</div>
				<div class="elementor-element elementor-element-c2da3b1 elementor-widget elementor-widget-text-editor" data-id="c2da3b1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 14pt;"><b>Many of these risks are not new, so why do organizations fail to find these problems before releasing code to production, or fail to protect these vulnerabilities against attack in production?</b> (Considering the newly added category: ‘Insecure Design’).</span></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-4d03445 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="4d03445" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c01732" data-id="7c01732" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-76efb68 elementor-widget elementor-widget-heading" data-id="76efb68" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">The impact of broken access control</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-f74397f mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f74397f" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Hidden Exposure for Sensitive Data, Elevation of privilege usage of the custom API attack tool, CORS misconfiguration allowing unauthorized API access, forced browsing, and  Depending on the specific vulnerability, the consequences can be devastating. The worst-case scenario is when an unauthorized user has access to a privileged function. This can give them the ability to modify or delete content on the website, or even worse, gain full control over the web application.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Remediating of access control vulnerabilities will typically involve changes to the functionality of application code. These changes often include implementing server-side checks to ensure that the users attempting to access or modify data have rights to do so and changing the default behavior to deny access/modification unless access is explicitly granted.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Organizations should investigate and implement a Systems Development Life Cycle (SDLC) policy that adopts secure coding practices while ensuring penetration testing is performed in the final stages of development to identify access control issues not identified during development.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-87390a7 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="87390a7" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-361107c" data-id="361107c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e1118ca elementor-widget elementor-widget-heading" data-id="e1118ca" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">What mapgenesys can do as your Security Specialist</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-6e11bd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="6e11bd7" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5570d7b" data-id="5570d7b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b80a890 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="b80a890" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Our Cybersecurity Practitioners, Professional Services (PS), and Security Specialists, and DevOps teams can improve monitoring, compliance, and response with centralized control of all cloud workloads and IaaS, PaaS, container, and virtual environment. Our team conducts penetration testing as part of our security testing services.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Our advanced endpoint security solution includes several technologies and capabilities like zero-day threats by using machine-learning, behavioral analysis, Security Analytics, Real-time threat intelligence, and Endpoint detection and response (EDR).</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Fully managed end-to-end vulnerability management program development and administration.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">The protection of systems and devices has become more important and we pledge to ease out the difficulty in managing your security services.</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-85f8aed elementor-widget elementor-widget-heading" data-id="85f8aed" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Added Benefits with mapgenesys</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-ebda97a mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="ebda97a" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Auditing and reporting for visibility into the usage of systems and its information</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Deliver smarter authentication, secure authorization, and high scalability</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Enforcement of user access rights to certain systems and information</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Govern and protect your business, data, users and assess</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b929d61 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="b929d61" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e245ebc" data-id="e245ebc" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f245315 elementor-widget elementor-widget-text-editor" data-id="f245315" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 14pt;"><b>mapgenesys Managed AppSec services allow you to offload your application security program</b> – from Application scanning and vulnerability validation to pen testing – onto our experts, guaranteeing a consistent application assessment process to help you to minimize your workload, maximize your productivity, and free you up for other tasks. </span></p><p><span style="font-size: 14pt;">mapgenesys Application security services consist of 3 categories:</span></p>								</div>
				</div>
				<div class="elementor-element elementor-element-fc8b09d elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="fc8b09d" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
										<span class="elementor-icon-list-text">1. Application Security Assessments</span>
									</li>
								<li class="elementor-icon-list-item">
										<span class="elementor-icon-list-text">2. Managed Application Security</span>
									</li>
								<li class="elementor-icon-list-item">
										<span class="elementor-icon-list-text">3. <a href="https://mapgenesys.com/professional-cybersecurity-services-solutions/" target="_blank">Professional Services</a></span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-2e74504 elementor-widget elementor-widget-image" data-id="2e74504" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="712" height="304" src="https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img2-comp.png" class="attachment-full size-full wp-image-1898" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img2-comp.png 712w, https://mapgenesys.com/wp-content/uploads/2022/05/owasp-img2-comp-300x128.png 300w" sizes="(max-width: 712px) 100vw, 712px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Human-Led Threat Hunting Methodology with mapgenesys for Seamless Security</title>
		<link>https://mapgenesys.com/old-threats-new-faces-threat-hunting-made-easy-with-mapgenesys/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Thu, 12 May 2022 11:47:27 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1859</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1859" class="elementor elementor-1859">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-1afad4e elementor-section-content-middle ct-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1afad4e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c18e334" data-id="c18e334" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b7456cd elementor-widget elementor-widget-heading" data-id="b7456cd" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">According to data from CrowdStrike, 68% of detections from the last three months were not malware-based - identifying more than 65,000 potential intrusions, or approximately 1 potential intrusion every 8 minutes — 24 hours a day, 365 days a year.</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-39fd047 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="39fd047" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0e9de90" data-id="0e9de90" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-9f77395 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="9f77395" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-02625f2" data-id="02625f2" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-ab2fd46 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="ab2fd46" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">The time an adversary takes to move laterally, from an initially compromised host to another host within the victim environment - from July 1, 2020, to June 30, 2021, the average was just 1 hour 32 minutes. Moreover, it was found that in 36% of those intrusions, the adversary was able to move laterally to additional hosts in less than 30 minutes.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Most ransomware operators engaged in big game hunting (BGH) activity have now adopted the threat of data leaks alongside data encryption to extract payment from victims. Many adversaries have also established dedicated leak sites (DLSs) as a forum to publicize victim details and release the stolen data. INDRIK SPIDER is an exception to this trend toward the use of data extortion.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">A year-over-year comparison of the total number of attempts that were observed is that attacks targeting the telecommunications and retail industries more than doubled. The professional services industry saw a more than 90% increase in numbers, while the government and academic sectors both saw attacks increase by more than 80%.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Common initial access techniques observed in use against the telecommunications industry include spearphishing, vulnerability exploitation, use of legitimate credentials, and supply chain compromise. Once access has been gained, adversaries often exploit services or use system-native tools, such as Windows Management Instrumentation (WMI) and various command and script interpreters, to stage the rest of their operation.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">China-nexus adversary WICKED PANDA often uses a variety of remote access tools including Cobalt Strike and their custom software such as Winnti, ShadowPad, or RouterGod to progress their intrusions. The LightBasin cluster has a diverse toolset that includes a tool referred to as sun4me, which has been deployed as an encrypted payload using a key derived from the victim's environment and is decrypted by a tool referred to as STEELCORGI. sun4me's wide-ranging features include: </span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-7829afa mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7829afa" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Tools to enumerate the network via SNMP, UDP and different traceroute mechanisms</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">WHOIS and DNS query tools</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Exploits for HeartBeat, Java over Remote Method Invocation (RMI), Apache Struts,</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Weblogic, Veritas Veritas NetBackup, and others</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Administration interface for MikroTik routers</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Tools to remotely extract the configuration from Cisco routers</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Tools to decrypt passwords from Cisco configuration, vncpasswd, and cvspass files</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Tools to monitor activity on the infected host</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Tools to enumerate remote users and brute force their credentials via SSH</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="far fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Utility tools such as grep, hexdump, shred, compress and uncompress, and various versions of netcat</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-22a9490 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="22a9490" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8f33f56" data-id="8f33f56" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e0a1a69 elementor-widget elementor-widget-heading" data-id="e0a1a69" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">mapgenesys Human-led Threat Hunting Methodology</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-0d11f6c elementor-widget elementor-widget-text-editor" data-id="0d11f6c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 14pt;">Threat hunting is the adoption of simple and unique methods, standards, and practices, it is a unique ability to see and stop the most sophisticated threats. With top-level proactive threat hunting, anomaly detection, statistical &amp; behavioral analysis, our threat hunters have helped our clients achieve a secure environment.</span></p><p><span style="font-size: 14pt;">Our Human-led Threat Hunting Methodology finds <em>a needle in a haystack</em> — described below, to systematically detect threats at scale:</span></p>								</div>
				</div>
				<div class="elementor-element elementor-element-2dc1e78 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="2dc1e78" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text"><strong>Search for indicators of compromise:</strong> Using Indicators of Attack (IOAs) and tactics, techniques, and procedures (TTPs) proactively hunt for and validate potential threats and incidents- Rather than sit back and wait for threats to strike.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text"><strong>Hypothesis-driven investigation:</strong> Our cyber threat hunters gather events from millions of endpoints and formulate a hypothesis that aligns with MITRE and is based on knowing the behaviors of threat actors and validate those hypotheses through active searches in the environment.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text"><strong>Initiate actions to remotely disrupt, contain, and neutralize threats:</strong> We hunt and detect threats faster, 24x7, and respond more adaptively to contain and remediate. We protect our clients from countless new vulnerability points and highly sophisticated attacks.</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-ff2ea7b elementor-widget elementor-widget-text-editor" data-id="ff2ea7b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 14pt;">With each new threat, mapgenesys extracts new insights to drive continuous advancements in automated detections and human threat hunting.</span></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-0880705 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="0880705" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0b4109" data-id="c0b4109" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f2dc6cd elementor-widget elementor-widget-heading" data-id="f2dc6cd" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Outcome-Focused Security</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-374e200 elementor-widget elementor-widget-heading" data-id="374e200" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Our experts look at the behaviors and activities associated with malicious screen capture activity, including the writing of image files to disk, the deployment and execution of file compression and archival utilities, and anomalous traffic to unknown external hosts that may indicate potential exfiltration activity. Our Threat hunters proactively investigate lateral movement activity, enriched by contextual system events.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-43fc070 elementor-widget elementor-widget-heading" data-id="43fc070" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Our mission is to expose advanced interactive threats and deliver actionable contextual threat intelligence through our shared factory operations. mapgenesys supports fully and co-managed security teams around the globe by delivering alerts in Real-time. These alerts enable security responders to act quickly and decisively against live threats in their environment. But finding the threat is only half the battle — it is crucial that defenders contain and remediate the threat quickly before any damage can be done. </p>				</div>
				</div>
				<div class="elementor-element elementor-element-6193622 elementor-widget elementor-widget-heading" data-id="6193622" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Difficulty in Finding threats? known adversaries or insider threats or outside attackers? Our Team is constantly monitoring the threat landscape to detect new types of attacks, critical vulnerabilities, and the behavior of cybercriminals and other adversaries.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-0e9b1af ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="0e9b1af" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f7fa21d" data-id="f7fa21d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3c2fdf8 elementor-widget elementor-widget-heading" data-id="3c2fdf8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Recommendations for Seamless Security</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-48072f0 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="48072f0" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e622e12" data-id="e622e12" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a8d7d80 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="a8d7d80" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text"><strong>Organizations must employ strict patch management</strong> and enforce robust user and password controls, coupled with robust privileged access management practices while ensuring an appropriate level of scrutiny and caution is applied for all externally accessible services.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text"><strong>Be vigilant and ready to act.</strong> Adversaries are continuing to find new ways to breach organizations and can move laterally in just minutes. Defenders must hunt around the clock and must be ready to act within minutes.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text"><strong>Pay close attention to remote access.</strong> The use of legitimate, non-native remote access tools such as TeamViewer, AnyDesk, or VNC (and its variants) by eCrime actors is common. Defenders should restrict and audit the use of such tools in their environment, even for authorized use cases.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>LockBit Resurfaces with Version 2.0 Ransomware</title>
		<link>https://mapgenesys.com/lockbit-2-ransomware/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Thu, 12 May 2022 11:35:14 +0000</pubDate>
				<category><![CDATA[Malwares]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1852</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1852" class="elementor elementor-1852">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-f1fa018 ct-section-stretched elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f1fa018" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e80390" data-id="3e80390" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-e4d1fc5 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="e4d1fc5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b4669ad" data-id="b4669ad" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-228d0f3 elementor-widget elementor-widget-image" data-id="228d0f3" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="765" height="412" src="https://mapgenesys.com/wp-content/uploads/2022/05/lockbit-img1.jpg" class="attachment-full size-full wp-image-1854" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/lockbit-img1.jpg 765w, https://mapgenesys.com/wp-content/uploads/2022/05/lockbit-img1-300x162.jpg 300w" sizes="(max-width: 765px) 100vw, 765px" />															</div>
				</div>
				<div class="elementor-element elementor-element-cd86f33 elementor-widget elementor-widget-heading" data-id="cd86f33" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Like other ransomware-as-a-service (RaaS) operations, LockBit 2.0 looks for affiliates to perform the intrusion and exfiltration on targets.</b></p>				</div>
				</div>
				<div class="elementor-element elementor-element-de4a4d4 elementor-widget elementor-widget-heading" data-id="de4a4d4" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">The gang went on a hiring spree in the wake of DarkSide and REvil both shutting down operations, putting up wallpaper on compromised systems that includes text inviting insiders to help compromise systems, and promising payouts of millions of dollars. </p>				</div>
				</div>
				<div class="elementor-element elementor-element-5c7cf29 elementor-widget elementor-widget-heading" data-id="5c7cf29" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">LockBit 2.0 shows influences of and similarities to Ryuk and Egregor, particularly certain notable behaviors.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-8dc57d2 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="8dc57d2" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a90a343" data-id="a90a343" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d63067e elementor-widget elementor-widget-heading" data-id="d63067e" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Ransomware Threat Landscape:</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-e982512 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="e982512" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3595281" data-id="3595281" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-0ab681a mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="0ab681a" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Recently, Bangkok Airways has revealed it was the victim of a cyberattack from ransomware group LockBit, resulting in the publishing of stolen data.  LockBit mostly targets organizations like enterprises and governments that will be disrupted enough by ransomware that paying up is the easy way out.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Earlier this month the gang hit outsourcing and accounting firm Accenture. The company reported revenues of $44.33 billion in 2020 and had 569,000 employees across 50 countries. Rumors swirled that the cybercrimes demanded $50 million in cryptocurrency from the consulting MNC. The deadline was continually moved forward until Accenture concluded the stolen data was not significant.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-hand-point-right"></i>						</span>
										<span class="elementor-icon-list-text">Another LockBit target was UK train operator Merseyrail, which fell victim in April 2021. Trains continued to run on time, but the criminals got bragging rights after reportedly pwning a company director's Office 365 account and using it to email employees and journalists about their achievement.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-5c59efe ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="5c59efe" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b524706" data-id="b524706" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7bbb3f2 elementor-widget elementor-widget-heading" data-id="7bbb3f2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Indicators of Compromise</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-55febf3 elementor-widget elementor-widget-heading" data-id="55febf3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">File Hashes</p>				</div>
				</div>
				<div class="elementor-element elementor-element-5b3fcae elementor-widget elementor-widget-text-editor" data-id="5b3fcae" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<span style="font-size: 14pt; word-break: break-all;">Sha256 &#8211; 0545f842ca2eb77bcac0fd17d6d0a8c607d7dbc8669709f3096e5c1828e1c049</span>								</div>
				</div>
				<div class="elementor-element elementor-element-ca426b8 elementor-widget elementor-widget-heading" data-id="ca426b8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">URLs</p>				</div>
				</div>
				<div class="elementor-element elementor-element-5a5edb9 elementor-widget elementor-widget-text-editor" data-id="5a5edb9" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 14pt; word-break: break-all;">hxxp://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd[.]onion</span><br /><span style="font-size: 14pt; word-break: break-all;">hxxp://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did[.]onion</span><br /><span style="font-size: 14pt; word-break: break-all;">hxxp://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid[.]onion</span></p>								</div>
				</div>
				<div class="elementor-element elementor-element-729ac9c elementor-widget elementor-widget-heading" data-id="729ac9c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">TTPs</p>				</div>
				</div>
				<div class="elementor-element elementor-element-c22cd7d elementor-widget elementor-widget-text-editor" data-id="c22cd7d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									T1562.001: Impair defenses: disable or modify tools<br>
T1070.001: Indicator removal on host: clear Windows Event Logs<br>
T1041: Exfiltration Over C2 Channel<br>
T1486: Data encrypted for impact<br>
T1489: Service stop<br>
T1490: Inhibit System Recovery								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-d43d392 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="d43d392" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30e532c" data-id="30e532c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-bb2850b elementor-widget elementor-widget-heading" data-id="bb2850b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Details of the Operations:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-d48b28b elementor-widget elementor-widget-heading" data-id="d48b28b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">On August 23, 2021, a Russian-speaking tech blog YouTube channel “Russian OSINT” published an interview with the representatives of LockBit uncovering details of their operations</p>				</div>
				</div>
				<div class="elementor-element elementor-element-b54c35b elementor-widget elementor-widget-heading" data-id="b54c35b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">The LockBit 2.0 representative claims their ransomware to have the most advanced technical features allowing it to stand up among its competitors. Stated features include:</p>				</div>
				</div>
				<div class="elementor-element elementor-element-c14caf4 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="c14caf4" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
										<span class="elementor-icon-list-text">1) the fastest encryption speed and data exfiltration</span>
									</li>
								<li class="elementor-icon-list-item">
										<span class="elementor-icon-list-text">2) automated process of distribution and encryption.</span>
									</li>
								<li class="elementor-icon-list-item">
										<span class="elementor-icon-list-text">3) Immediate data exfiltration</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-2f998ff ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="2f998ff" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0379267" data-id="0379267" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-03f5d85 elementor-widget elementor-widget-heading" data-id="03f5d85" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">They do not attack healthcare and educational institutions, as well as social services and charities. Anything that contributes to the development of human beings and their safety remains untouched.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b379968 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="b379968" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af8b93e" data-id="af8b93e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7f0256c elementor-widget elementor-widget-heading" data-id="7f0256c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">mapgenesys's Recommendations and Best practices:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-6c2dbf7 elementor-widget elementor-widget-heading" data-id="6c2dbf7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Being aware of LockBit 2.0 capabilities, further developments, and how it is currently recruiting affiliates and insiders, it is advised to be prepared for upgrades and a lot more. Below are a few of mapgenesys’s recommendations that can help organizations prevent and mitigate the impact of attacks.</p>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-4be514b elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="4be514b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fafeb3b" data-id="fafeb3b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c23978e mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="c23978e" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">LockBit 2.0 is known for actively exploiting public-facing applications. Therefore monitoring endpoints should be the first mitigation strategy. The group specifically prefers the following infrastructural endpoints:</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-b5e9f71 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="b5e9f71" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Corporate VPN - especially Citrix/FortiNET</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Externally exposed RDPs</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-983a23d mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="983a23d" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">As a top-tier ransomware group, LockBit likely investigates recent CVEs including ProxyLogon and Microsoft Exchange exposure. Monitoring exposed endpoints and application of CVE-addressing patches is required.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Perform periodic vulnerability assessments, and conduct regular patching or virtual patching for operating systems and applications. Ensure that all installed software and applications are updated to their latest versions.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Perform security skills assessment and training for all personnel regularly, and conduct red-team exercises and penetration tests.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">LockBit prioritizes network investigation which enables them to steal sensitive data. Therefore, disrupting network movements via creating segregated segments of network, clear access hierarchy, and additional security for active directory, domain admin, and local domains can significantly complicate their operations.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Multifactor authentication is required to protect employees’ accounts from obtaining account credentials by actors that might be used to escalate privileges and move laterally within the network.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">It is suggested to perform daily backups and keep them offline to avoid data loss. </span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Audit and monitor all logs of events and incidents to identify unusual patterns and behaviors.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft IIS Web server is the new attack vehicle for Several Malware families</title>
		<link>https://mapgenesys.com/microsoft-iis-web-server/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Thu, 12 May 2022 11:20:51 +0000</pubDate>
				<category><![CDATA[Malwares]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1841</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1841" class="elementor elementor-1841">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-ade1e03 ct-section-stretched elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="ade1e03" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c52b9d" data-id="1c52b9d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-7e55e79 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="7e55e79" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e655990" data-id="e655990" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6060ec8 elementor-widget elementor-widget-image" data-id="6060ec8" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1600" height="1000" src="https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img1-comp.jpg" class="attachment-full size-full wp-image-1847" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img1-comp.jpg 1600w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img1-comp-300x188.jpg 300w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img1-comp-1024x640.jpg 1024w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img1-comp-768x480.jpg 768w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img1-comp-1536x960.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" />															</div>
				</div>
				<div class="elementor-element elementor-element-f9477ac elementor-widget elementor-widget-heading" data-id="f9477ac" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>#ESETresearch</b> reveals <b>#IIStealer</b>, a malicious IIS web server extension targeting credit card information from e-commerce transactions. <b>IIStealer</b> is implemented as a native module for Internet Information Services, Microsoft’s web server software.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-3751a25 elementor-widget elementor-widget-heading" data-id="3751a25" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"> It handles the server’s BeginRequest post-event notification, which means its code is called every time the IIS server starts processing a new HTTP request. </p>				</div>
				</div>
				<div class="elementor-element elementor-element-91daa8b elementor-widget elementor-widget-heading" data-id="91daa8b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>IIStealer</b> intercepts all the server traffic and logs payment information from e-commerce transactions, targeting POST requests made to payment URIs. The attacker then exfiltrates the logs by sending a special request to the compromised IIS server with an embedded password.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-0352acf elementor-section-full_width ct-section-stretched elementor-section-height-default elementor-section-height-default" data-id="0352acf" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0eb7e02" data-id="0eb7e02" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-1121003 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="1121003" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2a8da31" data-id="2a8da31" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-807a476 elementor-widget elementor-widget-image" data-id="807a476" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="2000" height="1050" src="https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img2-comp.png" class="attachment-full size-full wp-image-1848" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img2-comp.png 2000w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img2-comp-300x158.png 300w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img2-comp-1024x538.png 1024w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img2-comp-768x403.png 768w, https://mapgenesys.com/wp-content/uploads/2022/05/microsoft-iis-web-img2-comp-1536x806.png 1536w" sizes="(max-width: 2000px) 100vw, 2000px" />															</div>
				</div>
				<div class="elementor-element elementor-element-0c26ef4 elementor-widget elementor-widget-heading" data-id="0c26ef4" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">The malware affects e-commerce websites that don’t use third-party payment gateways.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-a709e30 elementor-widget elementor-widget-heading" data-id="a709e30" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Even with SSL/TLS and encrypted communication channels, <b>IIStealer</b> can access all data handled by the server, including credit card information being processed in its unencrypted state.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-55467bf elementor-widget elementor-widget-text-editor" data-id="55467bf" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p style="font-size: 18px;">Eset has published all the IOCs at the following location: <a href="https://github.com/eset/malware-ioc/tree/master/badiis">click here</a></p>								</div>
				</div>
				<div class="elementor-element elementor-element-090dc3f elementor-widget elementor-widget-text-editor" data-id="090dc3f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p style="font-size: 18px; font-family: "Rubik";">Read Eset’s full guide into analyzing malicious native IIS modules at: <a href="https://www.welivesecurity.com/2021/08/06/anatomy-native-iis-malware/">click here</a></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-d92de60 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="d92de60" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4635f49" data-id="4635f49" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-95e2fc1 elementor-widget elementor-widget-heading" data-id="95e2fc1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">mapgenesys's Recommendations and best practices</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-099dbdb elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="099dbdb" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ef56e2e" data-id="ef56e2e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6c029e8 elementor-widget elementor-widget-heading" data-id="6c029e8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">The best way to harden an IIS server is to:</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-843fcbf elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="843fcbf" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Analyze dependencies and uninstall unneeded IIS modules after upgrading</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Properly configure web server user/group accounts - Use dedicated accounts with strong, unique passwords for the administration of the IIS server</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Regularly patch your OS, and carefully consider which services are exposed to the internet, to reduce the risk of server exploitation</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Configure HTTP Request Filtering Options</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Dynamic IP address restrictions use a requestor’s IP addresses and domain name to determine whether or not to restrict access</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Only install native IIS modules from trusted sources</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Consider using a web application firewall, and/or endpoint security solution on your IIS server.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Do not send the password itself to the server (not even over SSL/TLS); use a protocol such as Secure Remote Password (SRP) to authenticate users without the need for the unencrypted password to be transmitted to the server, nor data that could be used to reauthenticate. IIS infostealers are a good example of why server-side hashing is not good enough.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Avoid unnecessarily sending sensitive information from the web application; use payment gateways.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-0ed20ba ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="0ed20ba" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9077ac4" data-id="9077ac4" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-53f4419 elementor-widget elementor-widget-text-editor" data-id="53f4419" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p style="font-size: 20px; text-align: left;">mapgenesys&#8217;s Cybersecurity Practitioners, Professional Services (PS), and Security Specialists are available to help determine the next steps beyond the guidance/guidelines. We provide you with proactive, contextual and effective Hardening and Standardization w.r.t IIS Webserver STIG <a href="https://www.stigviewer.com/stig/microsoft_iis_10.0_server/">click here</a>, OWASP guide to hardening IIS. <a href="https://www.owasp.org/index.php/Hardening_IIS">click here</a>, Center for Internet Security IIS 10 Benchmark. <a href="https://www.cisecurity.org/cis-benchmarks/">Benchmarks</a> and <a href="https://cdn.ttgtmedia.com/rms/pdf/security-windows_server_hardening_checklist.pdf">click here for pdf</a>.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-619b134 elementor-widget elementor-widget-text-editor" data-id="619b134" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p style="font-size: 20px; text-align: left;">As a part of our Managed Security Services, we collect Web site activity data in the W3C log file format from Microsoft IIS servers, along with these logs, we also ingest W3C-compliant log files generated by standard logging as well as advanced logging in IIS. This will be relevant to comply with technical, regulatory, and compliance reports such as PCI DSS, HIPAA, OWASP Top 10, and many others.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-f065a38 elementor-widget elementor-widget-heading" data-id="f065a38" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys is also capable of performing a full-fledged security assessment of a website or web application and discovers server misconfigurations and vulnerabilities</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AWS Cloud Security Issues: What You Need to Know</title>
		<link>https://mapgenesys.com/aws-cloud-security/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Thu, 12 May 2022 10:56:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity tips and advice]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1816</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1816" class="elementor elementor-1816">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-c930be8 elementor-section-full_width ct-section-stretched elementor-section-content-middle elementor-section-height-default elementor-section-height-default" data-id="c930be8" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-08ba821" data-id="08ba821" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-69c9a15 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="69c9a15" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-921ec9e" data-id="921ec9e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-83e07bf elementor-widget elementor-widget-image" data-id="83e07bf" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="600" height="337" src="https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img1-comp.jpg" class="attachment-full size-full wp-image-1835" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img1-comp.jpg 600w, https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img1-comp-300x169.jpg 300w" sizes="(max-width: 600px) 100vw, 600px" />															</div>
				</div>
				<div class="elementor-element elementor-element-7184b51 elementor-widget elementor-widget-heading" data-id="7184b51" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>You can’t secure what you can’t see!</b> With unique cloud opportunities and benefits, some challenges come with having AWS as your cloud platform.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-7342292 elementor-widget elementor-widget-heading" data-id="7342292" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">While the concerns and issues vary widely from company to company and industry to industry, are we prioritizing a Security Strategy ahead of controls and tools?</p>				</div>
				</div>
				<div class="elementor-element elementor-element-53134ea elementor-widget elementor-widget-heading" data-id="53134ea" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">As the ecosystem and cloud environment gets larger so do the security risks. Misconfiguration, insecure interfaces, and unauthorized access topped the list.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c4e8d1b elementor-section-full_width ct-section-stretched elementor-section-height-default elementor-section-height-default" data-id="c4e8d1b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a9bc2a" data-id="0a9bc2a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-a8d0dcc elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="a8d0dcc" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c2ae9ed" data-id="c2ae9ed" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5811160 elementor-widget elementor-widget-image" data-id="5811160" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1023" height="719" src="https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img2-comp.jpg" class="attachment-full size-full wp-image-1836" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img2-comp.jpg 1023w, https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img2-comp-300x211.jpg 300w, https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img2-comp-768x540.jpg 768w" sizes="(max-width: 1023px) 100vw, 1023px" />															</div>
				</div>
				<div class="elementor-element elementor-element-f45c42d elementor-widget elementor-widget-heading" data-id="f45c42d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>The over whelming digital transformation and consumerization of IT</b> has created an explosion of data and applications in the cloud. But this rapid proliferation of applications, services and moving workloads to the cloud comes with the risk of unmonitored access, security loopholes and data leaks.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-a096492 elementor-widget elementor-widget-heading" data-id="a096492" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Poor visibility into an organization’s cloud usage</b> is a major security challenge prompting many enterprises to reassess and adjust their security posture to suit the dynamic nature of cloud environments. It has been found that an average enterprise invests in 32 different cloud security tools at high cost.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-1df68e9 elementor-widget elementor-widget-heading" data-id="1df68e9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">But that is not all, ﬁnding <b>qualiﬁed cybersecurity expertise</b> is another top challenge for companies battling the shortage of cloud security skills</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-18910b5 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="18910b5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6b8003" data-id="f6b8003" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9e8e4ae elementor-widget elementor-widget-heading" data-id="9e8e4ae" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Each business must be able to answer the following key questions:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-6c990c0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="6c990c0" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Who has access to which applications and when?</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">How can we monitor for key file changes?</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Will we be notified promptly when something anomalous occurs?</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Do we have strong password policies and authentication practices?</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">What are the Compliance Controls?</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c3914af ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="c3914af" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6786e68" data-id="6786e68" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6ad76d9 elementor-widget elementor-widget-heading" data-id="6ad76d9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">AWS SECURITY RISKS:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-3c1cec6 elementor-widget elementor-widget-heading" data-id="3c1cec6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">A recent global Cloud Security Report released by Check Point and Cybersecurity Insiders shows that the top cloud security threats are unauthorized cloud access (42%), insecure interfaces (42%), misconfiguration of the cloud platform (40%), and account hijacking (39%).</p>				</div>
				</div>
				<div class="elementor-element elementor-element-7a32e05 elementor-widget elementor-widget-heading" data-id="7a32e05" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">AWS security is not fail-safe and operates on a <b>Shared Security Responsibility</b> model. This means that Amazon secures its infrastructure while you have your own security controls in place for the data and applications you deploy and store in the cloud.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-06e9548 elementor-widget elementor-widget-image" data-id="06e9548" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1212" height="664" src="https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img3-comp.jpg" class="attachment-full size-full wp-image-1837" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img3-comp.jpg 1212w, https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img3-comp-300x164.jpg 300w, https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img3-comp-1024x561.jpg 1024w, https://mapgenesys.com/wp-content/uploads/2022/05/aws-cloud-security-img3-comp-768x421.jpg 768w" sizes="(max-width: 1212px) 100vw, 1212px" />															</div>
				</div>
				<div class="elementor-element elementor-element-510c3c5 elementor-widget elementor-widget-heading" data-id="510c3c5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><i>According to RedLock’s research</i>, the average lifespan of a cloud resource is two hours and seven minutes. With multiple cloud accounts and regions, it is highly difficult to detect risks with decentralized visibility. 85% of resources associated with security groups don’t restrict outbound traffic at all.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-3a3786d elementor-widget elementor-widget-heading" data-id="3a3786d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Administrators often forget to disable root API access. The exposed applications structure requires you to strengthen existing security controls. This includes continuously updating your security configurations with sufficient patching, strong firewall configurations, and proper network security implementations.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-6355081 elementor-widget elementor-widget-heading" data-id="6355081" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">AWS S3 buckets are now exposed via additional channels and APIs, which create new security blind spots that hackers are waiting to exploit.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-55b487e ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="55b487e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c5d422a" data-id="c5d422a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6a7a0bf elementor-widget elementor-widget-heading" data-id="6a7a0bf" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Issues with AWS infrastructure configuration based on the research done by ScienceSoft:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-728089b mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="728089b" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">AWS Firewall Manager.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Identity and access management (IAM) controls.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Logging and monitoring tools (Amazon GuardDuty, CloudWatch, and CloudTrail used to implement an efficient SIEM solution as part of a comprehensive AWS monitoring approach).</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-ac16456 elementor-widget elementor-widget-heading" data-id="ac16456" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">These AWS infrastructure components may have the following typical misconfigurations:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-1db83b8 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="1db83b8" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Disabled multi-factor authentication for AWS services.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Amazon CloudTrail is not configured to log the API call history of key AWS services.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Wide-range permissions for S3 buckets, public cloud storage resources.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">IAM accounts are set up as a single point of access to multiple resources.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Broad access ranges for AWS Security Groups.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Startup and configuration scripts containing authorization info.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Public AWS AMIs (Amazon Machine Image) containing proprietary or sensitive data.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-square-full"></i>						</span>
										<span class="elementor-icon-list-text">Machine state snapshots placed in public storage.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b543856 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="b543856" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b1e706" data-id="1b1e706" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6b2f518 elementor-widget elementor-widget-heading" data-id="6b2f518" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">mapgenesys's layered, and in-depth Cloud Security Services offer 24x7 real-time monitoring of applications, devices and servers in the cloud, in short, complete visibility of all security events to minimize vulnerabilities in your cloud infrastructure. </p>				</div>
				</div>
				<div class="elementor-element elementor-element-28fd98b elementor-widget elementor-widget-heading" data-id="28fd98b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Our Cybersecurity Practitioners, Professional Services (PS), and Security Specialists, and DevOps teams can improve monitoring, compliance, and response with centralized control of all cloud workloads and IaaS, PaaS, container, and virtual environment. Our team conducts penetration testing as part of our security testing services.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-eb5b9e3 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="eb5b9e3" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6bdcf8" data-id="f6bdcf8" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6c2fcce elementor-widget elementor-widget-heading" data-id="6c2fcce" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">mapgenesys's Recommendations and best practices for AWS security:</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-41283db elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="41283db" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f2e9b1b" data-id="f2e9b1b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2522f32 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="2522f32" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Think of security at every layer. Make sure that every activity is traceable and that you manage privileges meticulously</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Be sure to encrypt every piece of sensitive data that you store in or transmit over your AWS environment.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Unified, comprehensive security across public, hybrid, and multi-cloud environments give you control over cloud configurations, application and API security management, and access controls, as well as monitoring data in transit, in use, and at rest.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Establish the proper identity and access management by setting up appropriate permissions.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Effectively locate security vulnerabilities using cloud security assessments</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Monitor and Audit Server access logs and Cloud watch metrics</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Harden AWS setup using CIS and DISA-STIG benchmarks</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-f91482b ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="f91482b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50b6b51" data-id="50b6b51" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-56bd9df elementor-widget elementor-widget-heading" data-id="56bd9df" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">As a part of our Managed Cloud Security services, we leverage AWS native tools like Security Hub, Trusted advisor, Route53, WAF, Kinesis, GuardDuty, CloudTrail, CloudWatch, Macie, MFA, Inspector, DDOS mitigation, IAM, Data Encryption and Infra security to provide holistic AWS cloud security.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-4d18089 elementor-widget elementor-widget-heading" data-id="4d18089" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Our cloud security experts are constantly available to discuss your company’s needs and goals for seamless security.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Kubernetes Security: Deployment Cyber Risks and mapgenesys’s Recommendations</title>
		<link>https://mapgenesys.com/security-is-one-of-the-hardest-challenges-of-running-kubernetes/</link>
		
		<dc:creator><![CDATA[mapgenesys]]></dc:creator>
		<pubDate>Thu, 12 May 2022 10:03:19 +0000</pubDate>
				<category><![CDATA[Expert opinion]]></category>
		<guid isPermaLink="false">https://mapgenesys.com/?p=1807</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1807" class="elementor elementor-1807">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-22e3fb2 elementor-section-full_width ct-section-stretched elementor-section-height-default elementor-section-height-default" data-id="22e3fb2" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9471d51" data-id="9471d51" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-eff490b elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="eff490b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d2c3ed5" data-id="d2c3ed5" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-4be1181 elementor-widget elementor-widget-image" data-id="4be1181" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1600" height="800" src="https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img1-comp.jpg" class="attachment-full size-full wp-image-1809" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img1-comp.jpg 1600w, https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img1-comp-300x150.jpg 300w, https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img1-comp-1024x512.jpg 1024w, https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img1-comp-768x384.jpg 768w, https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img1-comp-1536x768.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" />															</div>
				</div>
				<div class="elementor-element elementor-element-d7437dd elementor-widget elementor-widget-heading" data-id="d7437dd" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Kubernetes can be a valuable target for data and/or compute power theft. While data theft is traditionally the primary motivation, cyber actors seeking computational power (often for cryptocurrency mining) are also drawn to Kubernetes to harness the underlying infrastructure.</b> </p>				</div>
				</div>
				<div class="elementor-element elementor-element-50922aa elementor-widget elementor-widget-heading" data-id="50922aa" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">In addition to resource theft, cyber actors may also target Kubernetes to cause a denial of service.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-010a570 elementor-widget elementor-widget-heading" data-id="010a570" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default">Pods are the smallest deployable Kubernetes unit and consist of one or more containers. Pods are often a cyber actor’s initial execution environment upon exploiting a container. For this reason, Pods should be hardened to make exploitation more difficult and to limit the impact of a successful compromise.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b40490b elementor-section-full_width ct-section-stretched elementor-section-height-default elementor-section-height-default" data-id="b40490b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d6b5bb8" data-id="d6b5bb8" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-352024a elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="352024a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-81ddf13" data-id="81ddf13" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-26c9b65 elementor-widget elementor-widget-image" data-id="26c9b65" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="768" height="512" src="https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img2-comp.jpg" class="attachment-full size-full wp-image-1810" alt="" srcset="https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img2-comp.jpg 768w, https://mapgenesys.com/wp-content/uploads/2022/05/kubernetes-img2-comp-300x200.jpg 300w" sizes="(max-width: 768px) 100vw, 768px" />															</div>
				</div>
				<div class="elementor-element elementor-element-912f066 elementor-widget elementor-widget-heading" data-id="912f066" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Three common sources of compromise in Kubernetes are supply chain risks, malicious threat actors, and insider threats.</b></p>				</div>
				</div>
				<div class="elementor-element elementor-element-92f91f0 elementor-widget elementor-widget-heading" data-id="92f91f0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Supply chain risks</b> are often challenging to mitigate and can arise in the container build cycle or infrastructure acquisition.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-0db2a01 elementor-widget elementor-widget-heading" data-id="0db2a01" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Malicious threat actors</b> can exploit vulnerabilities and misconfigurations in components of the Kubernetes architecture, such as the control plane, worker nodes, or containerized applications. Insider threats can be administrators, users, or cloud service providers.</p>				</div>
				</div>
				<div class="elementor-element elementor-element-552d939 elementor-widget elementor-widget-heading" data-id="552d939" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<p class="elementor-heading-title elementor-size-default"><b>Insider threats</b> can be administrators, users, or cloud service providers. Insiders with special access to an organization’s Kubernetes infrastructure may be able to abuse these privileges.</p>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9cb923a ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="9cb923a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39ac137" data-id="39ac137" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-05ec534 elementor-widget elementor-widget-heading" data-id="05ec534" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Here are the recommended hardening measures and mitigations suggested by CISA and NSA:</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-cb4e93e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="cb4e93e" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Scan containers and Pods for vulnerabilities or misconfigurations.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Run containers and Pods with the least privileges possible.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Use network separation to control the amount of damage a compromise can cause.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Use firewalls to limit unneeded network connectivity and encryption to protect confidentiality.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Use strong authentication and authorization to limit user and administrator access as well as to limit the attack surface.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Use log auditing so that administrators can monitor activity and be alerted to potential malicious activity.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-circle"></i>						</span>
										<span class="elementor-icon-list-text">Periodically review all Kubernetes settings and use vulnerability scans to help ensure risks are appropriately accounted for and security patches are applied.</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-ef84ba4 elementor-widget elementor-widget-text-editor" data-id="ef84ba4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 14pt;">The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released a Cybersecurity Technical Report, “Kubernetes Hardening Guidance” &#8211; <a href="https://media.defense.gov/2021/Aug/03/2002820425/-1/-1/1/CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF">click here</a></span></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-7111175 ct-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="7111175" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-no">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f69329f" data-id="f69329f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-fd110ef elementor-widget elementor-widget-heading" data-id="fd110ef" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">mapgenesys's Recommendations For Seamless Security:</h2>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-43464a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="43464a9" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a4f01e3" data-id="a4f01e3" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f074dc2 elementor-widget elementor-widget-heading" data-id="f074dc2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">On the Control Plane:</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-399a94d mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="399a94d" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">TLS Everywhere</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Enable RBAC with Least Privilege, Disable ABAC, and Monitor Logs</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Use Third Party Auth for API Server</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Separate and Firewall your etcd Cluster</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Rotate Encryption Keys</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8e5fa6" data-id="f8e5fa6" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-211215c elementor-widget elementor-widget-heading" data-id="211215c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">On Workloads:</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-cf80182 mtmx-blog-list-items elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="cf80182" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Use Linux Security Features and PodSecurity Policies</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Statically Analyse YAML</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Run Containers as a Non-Root User</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Use Network Policies</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Scan Images and Run IDS</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<i aria-hidden="true" class="fas fa-check"></i>						</span>
										<span class="elementor-icon-list-text">Run a Service Mesh</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				</div>
		]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
