At RSM, one of our goals is to help guide the client into choosing the right test for them. This isn’t always as simple as it sounds, as it takes into consideration factors such as goals or size of the network. One of the most common questions we receive are on the difference between a penetration assessment and a Red Team assessment. Many in the cybersecurity world also ... READ MORE
Blog
AI Used in Scams: Faked Kidnapping
A mother of a 15-year-old girl, Jennifer DeStefano, received a disturbing phone call on January 20th, 2023, while taking her younger daughter, Aubrey, 13, to a dance rehearsal in Scottsdale Arizona. The call's caller ID showed an “Unknown number”, yet a familiar voice was heard on the other end of the telephone call. The voice belonged to her other teenager, Brianna ... READ MORE
The Monarchy Lives On – BECs are alive and well
For decades, fraudsters have attempted to separate people from their hard-earned money by purporting to be an exiled member of a royal family. Historically, this was done via phone calls and written letters to potential victims. Throughout the years, these “members” of the monarchy were able to successfully exploit peoples good will, and often greed, to steal untold amounts of ... READ MORE
Back to Basics: Phishing
Anyone with an email address has likely received suspicious messages in their inbox from time to time. These messages usually come from unfamiliar senders and try to get the recipient to perform some kind of action, like clicking a link or providing sensitive information. The message might even contain scare tactics intended to convince the recipient that failing to act could ... READ MORE
What Makes a Strong Password?
In today’s Security Essentials post, we’ll be discussing one of the most fundamental elements of security that every organization could stand to improve upon to strengthen their overall security posture. Of course, we’re talking about passwords and password requirements. We know that passwords are beneficial in preventing threat actors from compromising user accounts. But ... READ MORE
Intel Insights – USB Flash Drive Bombs Observed in Ecuador
RSM Defense Intelligence has observed some claims and reports of a Universal Serial Bus (USB) thumb drive or commonly called flash drive being used as single detonation bombs. One such example was in Ecuador. The device was mailed to a journalist and Ecuadorian television presenter, which resulted in the USB being utilized as an explosive after being plugged into the USB ... READ MORE
Managed Vs. Federated Office 365: What’s the Difference?
When considering the methods of attack an organization should defend itself, what comes to mind? Certainly, you should defend yourself against the most devastating forms of attack. That missing patch that leads to full domain compromise? Take care of that immediately. That password policy that means everyone uses “1234”? Should probably look at that too. What about the most ... READ MORE
Intel Insights – VMWare ESXi and ESXiArgs Ransomware
RSM Defense Intelligence has observed open-source reporting, as well as notifications from CISA(JCSA_AA23-039A), which indicates that malicious actors are exploiting known vulnerabilities in VMware ESXi software to gain access to servers and deploy ESXiArgs ransomware. Vulnerabilities utilized by the malicious actors include CVE-2021-21974 (CVSS 8.8), CVE-2020-3992 (CVSS 9.8), ... READ MORE
How to Perform OGNL Injection
While we frequently discuss SQL injection and command injection, OGNL injection receives a lot less attention. What is OGNL? OGNL stands for “Object Graph Navigation Language,” which is written through Java and is used in the Apache Struts2 framework for web applications. Struts2 was originally created to build “enterprise ready web applications” and was known for being able ... READ MORE
Intel Insights – ChatGPT: Good Angel or Bad Robot?
Since the roll out of Open AI’s publicly accessible ChatGPT (Generative Pre-training Transformer) on November 30, 2022, ChatGPT has been subject to widespread attention both in the Clearnet and “DarkWeb”. ChatGPT is based on the GPT architecture and was first released in 2019. Since then, it has undergone several updates and major changes. The GPT model was trained on a ... READ MORE