Cybersecurity Insights

David Kirkpatrick

Testing Problematic Authorisation Tokens With Burp

05/10/18 15:36

Every so often a web application comes along where a bit of customization is required in your testing strategy to test it properly. The Burp Suite proxy tool is probably one of the most used tools by penetration testers to test web applications. When a situation comes along where its normal customization menu options isn’t sufficient (e.g. using Burp Macros) we can include a custom written Burp Extension to do what we want.

Read More
Dan Ball

Getting to Grips With the Australian Notifiable Data Breaches Scheme.

19/06/18 13:48

In light of the Notifiable Data Breaches (NDB) scheme which came into effect in Australia on 22nd February 2018, Foregenix has launched three service packages designed to help Australian businesses identify and minimize the risk of being subject to NDB reporting regulations and fines.

Read More
Benjamin Hosack

New Services to Secure Blockchain & Cryptocurrency

16/05/18 12:30

Foregenix is proud to announce the launch of its Blockchain & Cryptocurrency Security Practice. Building upon years of experience in the Payment Card Industry (PCI) helping organisations secure their people, processes and technology, and in response to constantly increasing cybersecurity attacks, Foregenix is once again extending its portfolio of services.

Read More
David Kirkpatrick

Know Your Attack Surfaces

02/05/18 14:22

During our engagements, we sometimes find customers have difficulty in determining what hosts they own and if they are live on the Internet. This can easily happen when you have a high turnover of networking staff, where the knowledge is not passed on, or you have a large infrastructure presence that can make it difficult to constantly manage/monitor. In a worst-case scenario, this can lead to compromise of data and possible exploitation of your internal network where ‘forgotten’ hosts are left unpatched and unmanaged.

Read More
Zacharias Pigadas

Purple Teaming, here's what you need to know.

27/04/18 10:11

Information security is infatuated with colours. It started with the blue boxing that allowed anyone to make free calls, then moved to black hats, white hats, grey hats (to denote attackers), then off to black box, grey box and white box testing to define the type of testing. The latest trend in colours reference red teaming, blue teaming and purple teaming. We will deal with the last one in the remainder of this blog.

Read More
David Kirkpatrick

Testing Problematic Authorisation Tokens With Burp

05/10/18 15:36

Every so often a web application comes along where a bit of customization is required in your testing strategy to test it properly. The Burp Suite proxy tool is probably one of the most used tools by penetration testers to test web applications. When a situation comes along where its normal customization menu options isn’t sufficient (e.g. using Burp Macros) we can include a custom written Burp Extension to do what we want.

Read More
Dan Ball

Getting to Grips With the Australian Notifiable Data Breaches Scheme.

19/06/18 13:48

In light of the Notifiable Data Breaches (NDB) scheme which came into effect in Australia on 22nd February 2018, Foregenix has launched three service packages designed to help Australian businesses identify and minimize the risk of being subject to NDB reporting regulations and fines.

Read More
Benjamin Hosack

New Services to Secure Blockchain & Cryptocurrency

16/05/18 12:30

Foregenix is proud to announce the launch of its Blockchain & Cryptocurrency Security Practice. Building upon years of experience in the Payment Card Industry (PCI) helping organisations secure their people, processes and technology, and in response to constantly increasing cybersecurity attacks, Foregenix is once again extending its portfolio of services.

Read More
David Kirkpatrick

Know Your Attack Surfaces

02/05/18 14:22

During our engagements, we sometimes find customers have difficulty in determining what hosts they own and if they are live on the Internet. This can easily happen when you have a high turnover of networking staff, where the knowledge is not passed on, or you have a large infrastructure presence that can make it difficult to constantly manage/monitor. In a worst-case scenario, this can lead to compromise of data and possible exploitation of your internal network where ‘forgotten’ hosts are left unpatched and unmanaged.

Read More
Zacharias Pigadas

Purple Teaming, here's what you need to know.

27/04/18 10:11

Information security is infatuated with colours. It started with the blue boxing that allowed anyone to make free calls, then moved to black hats, white hats, grey hats (to denote attackers), then off to black box, grey box and white box testing to define the type of testing. The latest trend in colours reference red teaming, blue teaming and purple teaming. We will deal with the last one in the remainder of this blog.

Read More