BLOG

The Rise of Mobile Malware

The Rise of Mobile Malware

Published: Dec 3, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Smartphones, tablets and other mobile devices have become ubiquitous in our society over the past few decades, leading to a world where many of us have one in our possession at all times.  The sheer technical capabilities of these devices are tremendous, and they have provided innumerable advancements in efficiency and accessibility for individuals and […]

More
Inbox (1): Proper Email Authentication

Inbox (1): Proper Email Authentication

Published: Nov 19, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

Emails are sent from a source server to a destination server (sometimes through multiple hops) via the SMTP protocol. When you use a webmail client – think Gmail and Yahoo – to send an email, the web server sends emails to its bundled SMTP server and handles authentication for you. When you send an email […]

More
The Root of Certificate Authorities

The Root of Certificate Authorities

Published: Nov 11, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

Ask any cybersecurity professional if using self-signed SSL certificates is acceptable, and they’ll probably say “not really.” Ask why, and we’ll say “we can’t always know who’s behind the screen,” even though we really want to say “Man-in-the-Middle attack.” Then we’d advise your server to utilize a certificate issued by a Certificate Authority trusted by […]

More
Moving Your Network Operations Center Remote

Moving Your Network Operations Center Remote

Published: Nov 10, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

Ahh, the Network Operations Center. I have been working in a NOC in many compacities my entire career in IT. I have also had the chance to build one from the ground up, physically and operationally, including the continued facilities management. Most people in the industry have either worked in, around, with or are aware […]

More
Scanning SMB Shares with SMBLS

Scanning SMB Shares with SMBLS

Published: Nov 4, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

In Carve’s internal engagement service line, we simulate an attacker on a corporate network, which is usually Windows-based. We use a variety of tools to gather information, but we were frustrated by reliability, performance and logging of tools dealing with scanning SMB shares, so we wrote a small Impacket-based tool as a replacement. The main […]

More
Navigating IT Solutioning in a Supply Shortage World

Navigating IT Solutioning in a Supply Shortage World

Published: Nov 3, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

How many times have you heard “long lead time,” “out of stock,” or “backordered” in the past few months? Vendors and IT professionals alike have had to get creative to solve the ever present challenges during this time of extreme demand and very low inventory. Unless you’ve been living under a rock, you’ve heard about […]

More
How to Get Better Bugs from Your Pentest

How to Get Better Bugs from Your Pentest

Published: Oct 25, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

During scoping for penetration tests, customers often say that they want us to perform the engagement exactly as a bad actor would, with no collaboration from the customer’s IT or security teams and no access to inside information. This is known as a black box penetration test, a methodology we often advise against.  On the […]

More
High-Capacity Drives and Performance Considerations

High-Capacity Drives and Performance Considerations

Published: Oct 13, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

While working with a client the other day, we had an interesting conversation regarding footprint consolidation. As infrastructure has gotten smaller and faster, we are able to get more resources into a smaller footprint. At iVision, we see this use case on a regular basis:  a client is moving their current data center into a […]

More
The Feeling is Mutual: Elegant & Effective Authentication

The Feeling is Mutual: Elegant & Effective Authentication

Published: Sep 22, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

If your user base is primarily IoT devices and your organization doesn’t want to manage passwords for each device, then it seems like a series of unguessable passwords such as “d3v1ce [serial-number]” is the only solution. While that technically works, it isn’t the most user-friendly option. For a more elegant and effective solution, consider mutual […]

More
What Problem Does a Network Overlay Solve?

What Problem Does a Network Overlay Solve?

Published: Sep 13, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Software-defined networks have been around for several years. Often, people learn how the overlay works but may not know what problems they can solve. I will attempt to answer that question with a scenario. Let’s say we have in our data center 1,000 servers, each of which house 50-100 virtual servers. If we have 25 […]

More
How is IAM Divided Today?

How is IAM Divided Today?

Published: Sep 2, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Over time, identity & access management (IAM) has become, not only a complicated subject, but also the core to information security. When we think of InfoSec, we generally think of cybersecurity to detect or thwart distributed denial of service (DDoS) or brute force attacks. However, once a bad actor breaches the perimeter defense, what do they intend to […]

More