1SOC Advisory: Information Disclosure Vulnerability CVE-2023-35636 in Microsoft Outlook
Executive Summary A critical security flaw in Microsoft Outlook, identified as CVE-2023-35636, allows threat actors to compromise NT LAN Manager (NTLM) v2 hashed passwords. This vulnerability, now patched, poses a significant risk, particularly in email and web-based attack scenarios. This advisory provides an in-depth analysis of the issue, potential attack vectors, and recommended mitigations. Vulnerability […]
Why SOC‑as‑a‑Service (SOCaaS)
Many Cyber Security sources will write on the rapidly evolving threat landscape and the need to stay abreast (and up to date) in the latest technologies, trends, and challenges. Whilst this is very true, the onus and responsibility can be a very heavy burden to bear. Instead of overwhelming you with the vast amounts of […]
Vigilance in the Digital Realm: The Crucial Role of Incident Detection and Response
In the fast-paced and interconnected world of Cyber Security, where new threats emerge daily, organizations must fortify their defenses with robust Incident Detection and Response (IDR) strategies. The ability to swiftly identify and mitigate security incidents is no longer a luxury but a necessity in safeguarding digital assets. This blog delves into the pivotal role […]
Navigating the Cyber Battlefield: The Crucial Role of Threat Intelligence and Analysis
In the relentless realm of Cyber Security, where threats evolve at an unprecedented pace, organizations find themselves in a perpetual battle to safeguard their digital assets. In this landscape, Threat Intelligence and Analysis emerge as indispensable tools, providing a proactive and strategic approach to identify, understand, and mitigate cyber threats. Understanding Threat Intelligence: At its […]
Navigating the Fine Line: My Perspective on SOCaaS and Penetration Testing Versus Red Team Exercises
In my role as the Head of SOC for a SOC-as-a-Service (SOCaaS) company in South Africa, I’ve navigated the complex terrain of Cyber Security services. One recurring theme in my professional journey has been the debate on the appropriateness of SOC-as-a-Service (SOCaaS) providers conducting penetration tests for their clients. Drawing from my experiences, I’ll delve […]
Harnessing External Threat Intelligence: A Key Pillar in SOCaaS Efficiency
In my capacity as the Head of SOC for a South Africa-based SOC-as-a-Service (SOCaaS) company, I’ve come to appreciate the pivotal role of external threat intelligence in enriching our Cyber Security services. Drawing from my hands-on experiences, this article aims to elucidate the significance of integrating external threat intelligence into SOC-as-a-Service (SOCaaS) and how it […]
Maidar Secure Advisory: Improper Access Control Vulnerability CVE-2023-39253 in Dell OS Recovery Tool
Dell Technologies released a knowledge base article (Article Number: 000217699) for an improper access control vulnerability in Dell OS recovery tool. Recognized as CVE-2023-39253, this vulnerability poses a significant risk. A local authenticated non-administrator user could potentially exploit this vulnerability, leading to the elevation of privilege on the system. To safeguard against this risk, it […]
TCS+ | SOC‑as‑a‑Service: Maidar Secure and the future of Cyber Security
A robust security operations centre (SOC) that is well run and equipped with the latest technologies and expertise can help bolster the security posture of any organisation. CYBER1 executives Simon Perry and Gerald Naude tell TechCentral’s TCS+ technology show about the investment and what it means for business. Perry, who is chief technology officer at CYBER1, […]
Maidar Secure Advisory: Spoofing Vulnerability CVE-2023-36559 on Microsoft Edge Chromium-based
Microsoft took action on Friday, October 13, 2023, by releasing a security update guide in response to a vulnerability that impacts their Chromium-based web browser, Microsoft Edge. The vulnerability is identified as CVE-2023-36559 with a base score of 4.2, there is limited information available about the specific spoofing methods that can be used to exploit […]
Maidar Secure Advisory: 0‑days exploit Vulnerability CVE‑2023‑41991, CVE‑2023‑41992, CVE-2023‑41993 for iPhones
Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0‑day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is used to install its Predator spyware secretively onto a device. Vulnerabilities Discussed CVE-2023-41991CVE-2023-41992CVE-2023-41993 Table of Contents Details of the Vulnerabilities The vulnerabilities known as CVE-2023-41991, […]