Author: Thomas

Splunk vulnerabilities and trust boundaries blo
Splunk
Thomas

Splunk vulnerability analysis – CVE-2024-29946 & CVE-2024-29945

Splunk vulnerability analysis – CVE-2024-29946 & CVE-2024-29945 in relation to a common threat model. DISCLAIMER – The author of this blog shall not be held responsible for any negative outcomes that may occur as a result of following advice given in this blog. Caveat emptor – use advice and ideas presented in this blog at your own risk.

Read More »
kicker.cloud
business
Thomas

Case: How we helped kicker.cloud achieve ISO 27001 certification

This is a case-study about the certification path of kicker.cloud, a very small startup company, its SaaS product and high ambitions aiming towards a global market. kicker.cloud encountered the same issues so many others have faced before and will in the future – the dreaded procurement Excel-sheets with seemingly endless amounts of security requirements that need to be addressed before any business deals can go ahead.

Read More »
We are Purple - Purple is the new Black
ddos
Thomas

DDoS Purple Teaming

The need for a cyber resilience exercise often starts from interest to gain verified information what each component is capable of — the capabilities, thresholds and baselines of the packet scrubber and other controls. Also, there is a need for training for crisis situations for organizations, as the threats for cyber resilience are on the rise.

Read More »
security.txt RFC9116
business
Thomas

RFC9116 & security.txt – what, why and how

Having a security.txt in the root (/) folder of your website has long been a good practice. The contents of the file has been very free. What started out as a novel and great idea, is now an RFC. Let’s look a bit closer.

Read More »
Developing and coding
business
Thomas

 How does a virtual CISO work?

The first tasks of vCISO are usually to map the company’s real security needs, get to know the company and its business. A vision of obvious threats and threat models will emerge very quickly, for which rapid solutions can be found through an analytical approach.

Read More »
Veracode State of Software Security 12
Veracode
Thomas

Veracode State of Software Security 12

Similar to last year, we looked at the entire history of active applications, not just the activity associated with the application over one year. By doing so, we can view the full life cycle of applications, which results in more accurate metrics and observations.

Read More »
Splunk and Auditd
Splunk
Thomas

Splunk & Auditd with Defender ATP and Vulnerability Scanning

This blog post offers a few simple tricks and tips that will ensure that your security controls do not interfere with each other. The tricks are not really tricks, just plain old configurations which offers food for thought. As we know, Splunk is the most complex beast of a software out there.

Read More »
Mint Security Video
Veracode
Thomas

Veracode Security Labs Demo

22.09.2020 We at Mint Security wanted to have a look at… We scanned Koronavilkku – these are our findings 30.06.2020 Developers are, in effect, the

Read More »
Redteaming - Search Engine
Security Testing
Thomas

Red Teaming and Recon

Recon and red teaming can be done separately, but they also work hand in hand. It may be a good idea for a company to do a thorough recon to understand the adversaries view on the organization – and this not only in the technical sense.

Read More »
16.6.2020 Domain Hijacking Webinar Spamhaus
Spamhaus
Thomas

Webinar: Domain hijacking – a prevalent problem

The threat landscape is constantly changing as cybercriminals continually try to avoid detection, and increase the number of legitimate resources they can utilize. Recently domain hijacking has become more prevalent. Every day this year, Spamhaus has observed over a 100 hijacked domains at one single domain registrar.

Read More »
isms
Thomas

First steps of an ISMS project

Planning for an industry standard compliant information security management system — in brief: carrying out an ISO 27001 project — can break cover from various starting points. Some organizations have already familiarized themselves with the standard, some have even written the first mandatory documents. Yet for many, this article could be the first contact with any form of security work at all.

Read More »
AlphaSOC - running an on-prem AE server
alphasoc
Thomas

Different AlphaSOC deployment options

“The cloud!” somebody shouts out loud. “This means my data is sent to the cloud – my precious telemetry data that in the hands of the bad guys could reveal too much about myself!”. This is correct. And for the sake of transparency, let’s have a look at what actually goes on behind the scenes.

Read More »
Mint Splunk Consulting Services
siem
Thomas

Mint Splunk Consulting Services

Mint Security tarjoaa Splunkia käyttäville erilaisia lisäarvollisia Splunk konsultointipalveluita jolla saadaan omasta ympäristöstä kaikki irti – turvallisesti.

Read More »