<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[shesecures]]></title><description><![CDATA[Welcome to SheSecures.in!

Dive into the world of cybersecurity with expert tips, latest threats, practical advice, and industry insights to safeguard your digi]]></description><link>https://shesecures.in</link><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 11:02:36 GMT</lastBuildDate><atom:link href="https://shesecures.in/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[OWASP Top 10 (2021)]]></title><description><![CDATA[Introduction

OWASP stands for Open Worldwide Application Security Project.

It acts as a global safety club for software where experts from around the world share knowledge to help make websites and apps more secure.

It’s a list of the 10 most comm...]]></description><link>https://shesecures.in/owasp-top-10-2021</link><guid isPermaLink="true">https://shesecures.in/owasp-top-10-2021</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[WomenInTech]]></category><category><![CDATA[owasp]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Wed, 30 Apr 2025 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1762009979238/b046a657-de99-425a-92ba-ff930a78cf02.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1 id="heading-introduction">Introduction</h1>
<ul>
<li><p>OWASP stands for <strong>Open Worldwide Application Security Project.</strong></p>
</li>
<li><p>It acts as a <strong>global safety club for software</strong> where experts from around the world share knowledge to help make websites and apps more secure.</p>
</li>
<li><p>It’s a list of the 10 most common and dangerous mistakes developers could make when building websites or apps and helps teams to spot and fix vulnerabilities.</p>
</li>
<li><p>These mistakes can let hackers steal data, break into systems, or cause major damage.</p>
</li>
<li><p>The list is updated every four years based on real-world attacks and expert feedback.</p>
</li>
<li><p>Why It Matters for Developers, Testers, and Security Teams</p>
<ul>
<li><p><strong>Developers</strong> use it to avoid writing risky code.</p>
</li>
<li><p><strong>Testers</strong> use it to find weak spots before the app goes live.</p>
</li>
<li><p><strong>Security teams</strong> use it to fix problems and protect users.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-what-changed-from-2017-to-2021-edition"><strong>What changed from 2017 to 2021 edition</strong></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761976806454/a7bbd75c-3821-4451-a9b0-3ad37b0596f7.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-a01-broken-access-control"><strong>A01 – Broken Access Control</strong></h2>
<ul>
<li><p>Occurs when users can access resources or perform actions beyond their intended permissions.</p>
</li>
<li><p><strong>Explanation:</strong> It moved from 5th position to the top of the list. In this attack, attackers take the help of session management and try to access data from the unexpired session tokens, which gives them access to many valid IDs and passwords.</p>
</li>
<li><p><strong>Example:</strong> A user changes the URL from …/user/123 to …/user/124 and accesses another user's profile</p>
</li>
<li><p><strong>Real Breach:</strong> GitHub once had a flaw allowing users to view private repositories by manipulating access token (2012)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Implement role-based access control (RBAC).</p>
</li>
<li><p>Verify user permissions on both client and server sides.</p>
</li>
<li><p>Use secure frameworks to handle access control.</p>
</li>
<li><p>Centralize access control logic.</p>
</li>
<li><p>Log and monitor access control failures.</p>
</li>
<li><p>Apply the principle of least privilege.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a02-cryptographic-failures"><strong>A02 – Cryptographic Failures</strong></h2>
<ul>
<li><p>Occurs when sensitive data (like passwords or credit card information) isn’t properly protected using encryption.</p>
</li>
<li><p><strong>Explanation:</strong> Shifts up one position from 3rd to 2nd position in the list. It is previously known as Sensitive Data Exposure. It focus on failures related to cryptography which often leads to sensitive data exposure or system compromise.</p>
</li>
<li><p><strong>Example:</strong> An app transmits login credentials over HTTP, exposing them to interception.</p>
</li>
<li><p><strong>Real Breach:</strong> Equifax’s breach involved unencrypted sensitive data, contributing to massive exposure (2017).</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Use strong, modern encryption algorithms like AES-256 to protect sensitive data.</p>
</li>
<li><p>Always encrypt data in transit using TLS (HTTPS) and data at rest to safeguard information throughout its lifecycle.</p>
</li>
<li><p>Store passwords using strong hashing algorithms.</p>
</li>
<li><p>Audit cryptographic systems regularly to detect weaknesses and vulnerabilities.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a03-injection"><strong>A03 – Injection</strong></h2>
<ul>
<li><p>Occurs when untrusted input is executed as part of a command or query, leading to unintended actions.</p>
</li>
<li><p><strong>Explanation:</strong> Slides down to 3rd position in the list. Not all applications are vulnerable to this attack, only the applications that accept parameters as input are vulnerable to injection attacks.</p>
</li>
<li><p><strong>Example:</strong> A login form allows SQL like admin'-- to bypass authentication.</p>
</li>
<li><p><strong>Real breach:</strong> The famous Sony Pictures hack exploited SQL injection to access internal databases (2011)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Use parameterized queries or prepared statements.</p>
</li>
<li><p>Validate and sanitize all user inputs.</p>
</li>
<li><p>Avoid building SQL queries using string concatenation.</p>
</li>
<li><p>Apply the principle of least privilege to database users.</p>
</li>
<li><p>Keep your database and libraries up to date.</p>
</li>
<li><p>Deploy a Web Application Firewall (WAF) as an extra layer.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a04-insecure-design"><strong>A04 – Insecure Design</strong></h2>
<ul>
<li><p>Refers to weaknesses that present in the <strong>designing process</strong> of a product</p>
</li>
<li><p><strong>Explanation:</strong> They include flaws like lack of assessment of the security measures required in a design during development phase.</p>
</li>
<li><p><strong>Example:</strong> A banking app allows fund transfers without verifying the recipient’s account ownership for the 2nd time.</p>
</li>
<li><p><strong>Real breach:</strong> Many fintech apps have been found lacking threat modeling, leading to logic flaws (2020-2023)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Implement secure-by-design principles during development.</p>
</li>
<li><p>Apply rate limiting to sensitive endpoints.</p>
</li>
<li><p>Threat modelling for designing authentication, access controls, business logics and key flows</p>
</li>
<li><p>Conduct unit and integration tests to check if all critical flows of the design are safe as per the threat model</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a05-security-misconfiguration"><strong>A05 – Security Misconfiguration</strong></h2>
<ul>
<li><p>Refers when security settings are improperly configured, leaving systems exposed.</p>
</li>
<li><p><strong>Explanation:</strong> Moved from 6th to 5th position in the list. The most common reason for this vulnerability is not patching or upgrading systems, frameworks, and components.</p>
</li>
<li><p><strong>Example:</strong> Default admin credentials (admin/admin) left unchanged on a production server.</p>
</li>
<li><p><strong>Real breach:</strong> Capital One’s AWS misconfiguration exposed over 100 million customer records (2019)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Regularly audit and harden configurations.</p>
</li>
<li><p>Disable unnecessary features like directory listing or verbose error messages.</p>
</li>
<li><p>Using Dynamic application security testing (DAST).</p>
</li>
<li><p>Disabling the use of default passwords and Rotate and enforce strong credentials</p>
</li>
<li><p>Automated process to verify the effectiveness of security configurations time to time</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a06-vulnerable-and-outdated-components"><strong>A06 – Vulnerable and Outdated Components</strong></h2>
<ul>
<li><p>Refers to using outdated software components with known vulnerabilities.</p>
</li>
<li><p><strong>Explanation:</strong> Moved from 9th position and previously titled as Using Components with Known Vulnerabilities. It also occurs because developers frequently don’t know which <strong>open source and third-party components</strong> are present in their applications.</p>
</li>
<li><p><strong>Example:</strong> Using jQuery v1.7 with known XSS vulnerabilities.</p>
</li>
<li><p><strong>Real breach:</strong> The Struts2 vulnerability exploited in the Equifax breach was due to outdated components (2017)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Remove unnecessary dependencies, features, components and files</p>
</li>
<li><p>Install components of a system only from official sources through secure channels only.</p>
</li>
<li><p>Properly maintain the libraries and components and regularly check for updates and upgrades for each.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a07-identification-and-authentication-failures"><strong>A07 – Identification and Authentication Failures</strong></h2>
<ul>
<li><p>Occurs when authentication mechanisms are weak, allowing attackers to impersonate users.</p>
</li>
<li><p><strong>Explanation:</strong> Slide down from 2nd position and previously known as broken authentication. This normally occurs when applications <strong>incorrectly execute functions</strong> related to session management allowing intruders to compromise passwords, security keys, or session tokens.</p>
</li>
<li><p><strong>Example:</strong> Weak password policies allow users to set “123456” as their password.</p>
</li>
<li><p><strong>Real breach:</strong> LinkedIn’s 2012 breach exposed millions of weakly hashed passwords using SHA-1 (2012)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Implementing multi-factor authentication(MFA)</p>
</li>
<li><p>Protecting user credentials</p>
</li>
<li><p>Sending passwords over encrypted connections</p>
</li>
<li><p>Weak passwords should not be allowed for any user</p>
</li>
<li><p>Credential Recovery process must be secured</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a08-software-and-data-integrity-failures"><strong>A08 – Software and Data Integrity Failures</strong></h2>
<ul>
<li><p>Relates to the lack of validation on software updates or critical data.</p>
</li>
<li><p><strong>Explanation:</strong> New category in the 2021 edition. If an application relies on dependencies like libraries, modules or plugins from an untrusted source or repository it could lead to Software and Data Integrity Failures. </p>
</li>
<li><p><strong>Example:</strong> Auto-updating software pulls code from an unauthenticated source.</p>
</li>
<li><p><strong>Real breach:</strong> The SolarWinds attack injected malicious code into trusted updates (2020)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Ensuring libraries and dependencies are installed from trusted repositories.</p>
</li>
<li><p>Unencrypted serialized data should not be sent to untrusted clients without an integrity check.</p>
</li>
<li><p>Use of digital signature to verify the integrity of any software or data.</p>
</li>
<li><p>Secure CI/CD pipelines to prevent unauthorized changes.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a09-security-logging-and-monitoring-failures"><strong>A09 – Security Logging and Monitoring Failures</strong></h2>
<ul>
<li><p>Occurs when security events (e.g., login attempts, error messages) aren’t logged or monitored.</p>
</li>
<li><p><strong>Explanation:</strong> Moved from 10th position and previously titled as Insufficient Logging and Monitoring. When applications do not properly log critical events or fail to monitor and alert on suspicious activities. This can delay detection of breaches, hinder incident response, and allow attackers to operate undetected within systems.</p>
</li>
<li><p><strong>Example:</strong> A brute force attack on login pages goes unnoticed because no failed login attempts are logged.</p>
</li>
<li><p><strong>Real breach:</strong> Target’s 2013 breach went unnoticed for weeks despite alerts from their security system (2013)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Input validation for Login controls, access controls and server-side must be ensured.</p>
</li>
<li><p>Logs generated by the system should follow a particular format that can be easily stored and processed by log management solutions.</p>
</li>
<li><p>Regularly review logs for suspicious activity.</p>
</li>
<li><p>A proper implementation of an incident response plan in case of security incident</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-a10-server-side-request-forgery-ssrf"><strong>A10 – Server-side Request Forgery (SSRF)</strong></h2>
<ul>
<li><p>Occurs when an attacker tricks a server into sending requests to unintended locations.</p>
</li>
<li><p><strong>Explanation:</strong> Newly added risk to the list. When a web application do not validate the user-supplied URLs before fetching them, which lets the attacker to force the legit website to send a forged request to an unexpected destination, despite being protected by firewalls, access controls etc.</p>
</li>
<li><p><strong>Example:</strong> A file upload feature accepts a URL input to fetch the file. The attacker provides <a target="_blank" href="http://localhost/admin">http://localhost/admin</a>, which the server fetches, exposing internal admin data.</p>
</li>
<li><p><strong>Real breach:</strong> SSRF was a key vector in the <strong>Capital One AWS metadata exposure</strong> (2019)</p>
</li>
<li><p><strong>Prevention:</strong></p>
<ul>
<li><p>Sanitization and validation of all client-side input data.</p>
</li>
<li><p>HTTP redirections should be disabled.</p>
</li>
<li><p>Avoid using server-side functionality to fetch remote URLs unless necessary.</p>
</li>
<li><p>If URL fetching is required, limit it to internal logic with strict controls.</p>
</li>
<li><p>Use firewalls and network policies to prevent outbound requests to internal or sensitive systems.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-what-significant-changes-are-expected-in-the-2025-edition"><strong>What significant changes are expected in the 2025 edition?</strong></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1762009847716/4c739647-b8fc-4827-9d6c-11cf5b101402.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-final-tips-amp-takeaways"><strong>FINAL TIPS &amp; TAKEAWAYS</strong></h3>
<ol>
<li><p>Security is a shared responsibility across design, development, and operations.</p>
</li>
<li><p>Proactive threat modeling and secure coding help prevent most top risks.</p>
</li>
<li><p>Regular updates and patching are critical to reduce exposure from outdated components.</p>
</li>
<li><p>Access control and authentication must be enforced rigorously to protect sensitive data.</p>
</li>
<li><p>Monitoring and logging are essential for timely detection and response.</p>
</li>
<li><p>Security missteps often stem from misconfiguration—automate checks where possible.</p>
</li>
<li><p>OWASP Top 10 is a living framework—review it regularly to stay ahead of emerging threats.</p>
</li>
</ol>
]]></content:encoded></item><item><title><![CDATA[Penetration Testing: A Beginner’s Guide to Ethical Hacking]]></title><description><![CDATA[Introduction
Imagine your computer system as a fortress. Penetration testing, often called "pen testing," is like hiring a friendly hacker to try breaking into your fortress to find weak spots before the bad guys do. It’s a proactive way to uncover v...]]></description><link>https://shesecures.in/penetration-testing-a-beginners-guide-to-ethical-hacking</link><guid isPermaLink="true">https://shesecures.in/penetration-testing-a-beginners-guide-to-ethical-hacking</guid><category><![CDATA[pentesting]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[ethicalhacking]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Sat, 26 Apr 2025 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/63Sg6s3EocE/upload/1c303609dd96062faec4e9fb9262e0b0.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>Imagine your computer system as a fortress. Penetration testing, often called "pen testing," is like hiring a friendly hacker to try breaking into your fortress to find weak spots before the bad guys do. It’s a proactive way to uncover vulnerabilities and strengthen your defences. Let’s dive into what penetration testing is, how it works, and why it’s essential.</p>
<h4 id="heading-what-is-penetration-testing"><strong>What is Penetration Testing?</strong></h4>
<ul>
<li><p>Penetration testing is like a fire drill for your cybersecurity. It simulates an attack to see how well your defences hold up.</p>
</li>
<li><p><strong>Explanation:</strong> Penetration testing is a simulated cyberattack conducted by ethical hackers to identify vulnerabilities in systems, networks, or applications. The goal is to find and fix weaknesses before malicious hackers can exploit them.</p>
</li>
</ul>
<h4 id="heading-why-is-penetration-testing-important"><strong>Why is Penetration Testing Important?</strong></h4>
<ol>
<li><p><strong>Identify Weaknesses:</strong> It helps uncover security flaws that could be exploited by attackers.</p>
</li>
<li><p><strong>Prevent Data Breaches:</strong> By fixing vulnerabilities, organizations can protect sensitive data from being stolen.</p>
</li>
<li><p><strong>Ensure Compliance:</strong> Many industries require regular penetration testing to meet regulatory standards.</p>
</li>
<li><p><strong>Improve Security Posture:</strong> It provides insights into how attackers might infiltrate systems, helping organizations strengthen their defences.</p>
</li>
</ol>
<h4 id="heading-types-of-penetration-testing"><strong>Types of Penetration Testing</strong></h4>
<ol>
<li><p><strong>Network Penetration Testing:</strong></p>
<ul>
<li><p>Testing the locks and walls of your fortress.</p>
</li>
<li><p><strong>Explanation:</strong> Focuses on identifying vulnerabilities in network infrastructure, such as firewalls, routers, and servers.</p>
</li>
</ul>
</li>
<li><p><strong>Web Application Penetration Testing:</strong></p>
<ul>
<li><p>Checking the doors and windows of your fortress.</p>
</li>
<li><p><strong>Explanation:</strong> Examines web applications for vulnerabilities like SQL injection, cross-site scripting (XSS), and broken authentication.</p>
</li>
</ul>
</li>
<li><p><strong>Social Engineering Penetration Testing:</strong></p>
<ul>
<li><p>Testing how easily someone can trick your guards.</p>
</li>
<li><p><strong>Explanation:</strong> Simulates attacks that exploit human behaviour, such as phishing emails or phone scams.</p>
</li>
</ul>
</li>
<li><p><strong>Wireless Penetration Testing:</strong></p>
<ul>
<li><p>Checking the invisible walls around your fortress.</p>
</li>
<li><p><strong>Explanation:</strong> Identifies vulnerabilities in wireless networks, such as weak encryption or unauthorized access points.</p>
</li>
</ul>
</li>
<li><p><strong>Physical Penetration Testing:</strong></p>
<ul>
<li><p>Testing the physical barriers of your fortress.</p>
</li>
<li><p><strong>Explanation:</strong> Evaluates physical security measures, such as locks, cameras, and access controls.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-key-steps-in-penetration-testing"><strong>Key Steps in Penetration Testing</strong></h4>
<ol>
<li><p><strong>Planning and Reconnaissance:</strong></p>
<ul>
<li><p>Studying the fortress to find potential entry points.</p>
</li>
<li><p><strong>Explanation:</strong> Gathering information about the target system, network, or application.</p>
</li>
</ul>
</li>
<li><p><strong>Scanning:</strong></p>
<ul>
<li><p>Checking the walls for cracks.</p>
</li>
<li><p><strong>Explanation:</strong> Using tools to scan for vulnerabilities, such as open ports or outdated software.</p>
</li>
</ul>
</li>
<li><p><strong>Gaining Access:</strong></p>
<ul>
<li><p>Attempting to break into the fortress.</p>
</li>
<li><p><strong>Explanation:</strong> Exploiting vulnerabilities to gain unauthorized access.</p>
</li>
</ul>
</li>
<li><p><strong>Maintaining Access:</strong></p>
<ul>
<li><p>Staying inside the fortress undetected.</p>
</li>
<li><p><strong>Explanation:</strong> Testing if attackers can maintain a presence in the system.</p>
</li>
</ul>
</li>
<li><p><strong>Analysis and Reporting:</strong></p>
<ul>
<li><p>Writing a report on the fortress’s weak spots.</p>
</li>
<li><p><strong>Explanation:</strong> Documenting findings, including vulnerabilities exploited and recommendations for improvement.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-tools-used-in-penetration-testing"><strong>Tools Used in Penetration Testing</strong></h4>
<ol>
<li><p><strong>Metasploit:</strong> A popular framework for conducting penetration tests and exploiting vulnerabilities.</p>
</li>
<li><p><strong>Nmap:</strong> A tool for network scanning and mapping.</p>
</li>
<li><p><strong>Burp Suite:</strong> Used for web application security testing.</p>
</li>
<li><p><strong>Wireshark:</strong> A network protocol analyser for monitoring traffic.</p>
</li>
</ol>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>Penetration testing is a vital part of cybersecurity, helping organizations identify and fix vulnerabilities before attackers can exploit them. By simulating real-world attacks, ethical hackers provide valuable insights into how to strengthen defences and protect sensitive data. Whether you’re a small business or a large enterprise, penetration testing is an essential step toward building a secure digital fortress.</p>
]]></content:encoded></item><item><title><![CDATA[Understanding the NIST Cybersecurity Framework: A Simple Guide]]></title><description><![CDATA[Introduction
In today’s digital world, protecting sensitive information is more important than ever. The NIST Cybersecurity Framework (CSF) is a powerful tool that helps organizations manage and reduce cybersecurity risks. But what exactly is it, and...]]></description><link>https://shesecures.in/understanding-the-nist-cybersecurity-framework-a-simple-guide</link><guid isPermaLink="true">https://shesecures.in/understanding-the-nist-cybersecurity-framework-a-simple-guide</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[NIST]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Thu, 24 Apr 2025 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1745740978244/ecaf830f-d3f1-45b4-ac24-4a1f5036f6b8.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>In today’s digital world, protecting sensitive information is more important than ever. The NIST Cybersecurity Framework (CSF) is a powerful tool that helps organizations manage and reduce cybersecurity risks. But what exactly is it, and how does it work? Let’s break it down in simple terms.</p>
<h4 id="heading-what-is-the-nist-cybersecurity-framework"><strong>What is the NIST Cybersecurity Framework?</strong></h4>
<ul>
<li><p>The NIST Framework is like a guidebook that helps organizations build strong defences against cyber threats.</p>
</li>
<li><p><strong>Explanation:</strong> Developed by the National Institute of Standards and Technology (NIST), the framework provides a set of best practices, guidelines, and standards to help organizations improve their cybersecurity posture. It’s widely used across industries to identify, protect, detect, respond to, and recover from cyber threats.</p>
</li>
</ul>
<h4 id="heading-the-five-core-functions-of-the-nist-framework"><strong>The Five Core Functions of the NIST Framework</strong></h4>
<p>The framework is built around five core functions that represent the key areas of cybersecurity:</p>
<ol>
<li><p><strong>Identify</strong></p>
<ul>
<li><p>Know what you need to protect.</p>
</li>
<li><p><strong>Explanation:</strong> This involves understanding your organization’s assets, systems, and data, as well as identifying potential risks and vulnerabilities.</p>
</li>
<li><p><strong>Example:</strong> Creating an inventory of all devices and software used in your organization.</p>
</li>
</ul>
</li>
<li><p><strong>Protect</strong></p>
<ul>
<li><p>Put up defences to keep threats out.</p>
</li>
<li><p><strong>Explanation:</strong> This includes implementing safeguards to protect critical systems and data from cyber threats.</p>
</li>
<li><p><strong>Example:</strong> Using firewalls, encryption, and strong passwords to secure your systems.</p>
</li>
</ul>
</li>
<li><p><strong>Detect</strong></p>
<ul>
<li><p>Keep an eye out for suspicious activity.</p>
</li>
<li><p><strong>Explanation:</strong> This involves monitoring systems to quickly identify potential cybersecurity incidents.</p>
</li>
<li><p><strong>Example:</strong> Setting up alerts for unusual login attempts or unauthorized access.</p>
</li>
</ul>
</li>
<li><p><strong>Respond</strong></p>
<ul>
<li><p>Take action when something goes wrong.</p>
</li>
<li><p><strong>Explanation:</strong> This includes developing and implementing plans to respond to cybersecurity incidents effectively.</p>
</li>
<li><p><strong>Example:</strong> Having a response plan in place to contain and mitigate the impact of a data breach.</p>
</li>
</ul>
</li>
<li><p><strong>Recover</strong></p>
<ul>
<li><p>Get back on your feet after an attack.</p>
</li>
<li><p><strong>Explanation:</strong> This involves restoring systems and data to normal operations and learning from the incident to improve future defences.</p>
</li>
<li><p><strong>Example:</strong> Backing up data regularly and conducting post-incident reviews.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-why-is-the-nist-framework-important"><strong>Why is the NIST Framework Important?</strong></h4>
<ul>
<li><p><strong>Flexibility:</strong> It can be tailored to fit organizations of all sizes and industries.</p>
</li>
<li><p><strong>Proactive Approach:</strong> Helps organizations identify and address risks before they become major issues.</p>
</li>
<li><p><strong>Compliance:</strong> Aligns with various regulatory requirements, making it easier for organizations to meet compliance standards.</p>
</li>
</ul>
<h4 id="heading-how-to-use-the-nist-framework"><strong>How to Use the NIST Framework</strong></h4>
<ol>
<li><p><strong>Assess Your Current State:</strong> Identify your organization’s current cybersecurity practices and gaps.</p>
</li>
<li><p><strong>Set Goals:</strong> Define your desired cybersecurity outcomes based on the framework’s core functions.</p>
</li>
<li><p><strong>Develop a Plan:</strong> Create a roadmap to achieve your goals, including specific actions and timelines.</p>
</li>
<li><p><strong>Implement and Monitor:</strong> Put your plan into action and continuously monitor your progress.</p>
</li>
</ol>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>The NIST Cybersecurity Framework is a valuable tool for organizations looking to strengthen their cybersecurity defences. By following its five core functions—Identify, Protect, Detect, Respond, and Recover—organizations can better manage risks and protect their critical assets. Whether you’re a small business or a large enterprise, the NIST Framework provides a clear and effective path to cybersecurity success.</p>
]]></content:encoded></item><item><title><![CDATA[SAST vs. DAST: Understanding the Difference with Tool Examples]]></title><description><![CDATA[Introduction
In the world of cybersecurity, two powerful methods are used to identify and fix security vulnerabilities in software: SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing). While they may sound techn...]]></description><link>https://shesecures.in/sast-vs-dast-understanding-the-difference-with-tool-examples</link><guid isPermaLink="true">https://shesecures.in/sast-vs-dast-understanding-the-difference-with-tool-examples</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Vulnerability management]]></category><category><![CDATA[SAST]]></category><category><![CDATA[DAST]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Sat, 19 Apr 2025 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/HHtzGcZkRZY/upload/94089f583f40cfab5595fd4eeb5444b3.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>In the world of cybersecurity, two powerful methods are used to identify and fix security vulnerabilities in software: SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing). While they may sound technical, understanding these concepts is simpler than you think. Let’s break them down and explore how tools like Snyk and Qualys play a role in keeping software secure.</p>
<h4 id="heading-what-is-sast"><strong>What is SAST?</strong></h4>
<ul>
<li><p><strong>Layman’s Terms:</strong> SAST is like proofreading a book before it’s published. It checks the code for mistakes and vulnerabilities without actually running the software.</p>
</li>
<li><p><strong>Explanation:</strong> SAST analyses the source code, byte code, or binary code of an application to identify security vulnerabilities. It’s a proactive approach that helps developers catch issues early in the development process.</p>
</li>
</ul>
<p><strong>Example Tool: Snyk</strong></p>
<ul>
<li><p><strong>What it Does:</strong> Snyk is a developer-friendly SAST tool that integrates directly into your development environment. It scans your code in real-time, identifies vulnerabilities, and even suggests fixes.</p>
</li>
<li><p><strong>Features:</strong></p>
<ul>
<li><p>Real-time scanning while coding.</p>
</li>
<li><p>Auto-fixes for vulnerabilities.</p>
</li>
<li><p>Integration with popular IDEs and CI/CD pipelines.</p>
</li>
</ul>
</li>
<li><p><strong>Use Case:</strong> A developer uses Snyk to scan their codebase for vulnerabilities like SQL injection or cross-site scripting (XSS) while writing the code. Snyk provides actionable insights and fixes, ensuring secure code from the start.</p>
</li>
</ul>
<p><strong>Other Examples of SAST Tools:</strong></p>
<ol>
<li><p><strong>Checkmarx:</strong> A popular tool that scans code for vulnerabilities and provides detailed reports to help developers fix issues.</p>
</li>
<li><p><strong>SonarQube:</strong> An open-source platform that continuously inspects code quality and security.</p>
</li>
<li><p><strong>Veracode:</strong> Offers comprehensive security analysis and integrates with development workflows.</p>
</li>
</ol>
<h4 id="heading-what-is-dast"><strong>What is DAST?</strong></h4>
<ul>
<li><p><strong>Layman’s Terms:</strong> DAST is like test-driving a car to see if anything goes wrong. It checks the software while it’s running.</p>
</li>
<li><p><strong>Explanation:</strong> DAST tests an application in its running state to find vulnerabilities that could be exploited by attackers. It simulates real-world attacks to identify security weaknesses.</p>
</li>
</ul>
<p><strong>Example Tool: Qualys</strong></p>
<ul>
<li><p><strong>What it Does:</strong> Qualys Web Application Scanning (WAS) is a DAST tool that scans running web applications for vulnerabilities. It identifies issues like misconfigurations, broken authentication, and insecure data handling.</p>
</li>
<li><p><strong>Features:</strong></p>
<ul>
<li><p>Scans live applications for vulnerabilities.</p>
</li>
<li><p>Provides detailed reports with remediation steps.</p>
</li>
<li><p>Scalable for large environments.</p>
</li>
</ul>
</li>
<li><p><strong>Use Case:</strong> A security team uses Qualys WAS to scan a live web application for vulnerabilities like broken access control or sensitive data exposure. The tool provides a report with actionable recommendations to fix the issues.</p>
</li>
</ul>
<p><strong>Other Examples of DAST Tools:</strong></p>
<ul>
<li><p><strong>Acunetix:</strong> A web vulnerability scanner that detects and reports on a wide range of security issues.</p>
</li>
<li><p><strong>OWASP ZAP:</strong> An open-source tool that helps find security vulnerabilities in web applications.</p>
</li>
<li><p><strong>Netsparker:</strong> An automated web application security scanner that identifies vulnerabilities and provides actionable insights.</p>
</li>
</ul>
<h4 id="heading-key-differences-between-sast-and-dast"><strong>Key Differences Between SAST and DAST</strong></h4>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Aspect</strong></td><td><strong>SAST</strong></td><td><strong>DAST</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Timing</strong></td><td>Conducted early in the development process.</td><td>Conducted on running applications.</td></tr>
<tr>
<td><strong>Approach</strong></td><td>Analyses the code itself (static analysis).</td><td>Tests the application from the outside (dynamic analysis).</td></tr>
<tr>
<td><strong>Focus</strong></td><td>Identifies coding errors and vulnerabilities within the code.</td><td>Identifies vulnerabilities that can be exploited in the live environment.</td></tr>
<tr>
<td><strong>Example Tool</strong></td><td>Snyk</td><td>Qualys</td></tr>
</tbody>
</table>
</div><h4 id="heading-why-use-both"><strong>Why Use Both?</strong></h4>
<p>Using both SAST and DAST provides comprehensive security coverage:</p>
<ul>
<li><p><strong>SAST:</strong> Helps developers catch vulnerabilities early, saving time and costs.</p>
</li>
<li><p><strong>DAST:</strong> Identifies vulnerabilities that only appear when the application is running, ensuring real-world security.</p>
</li>
</ul>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>SAST and DAST are essential tools in the cybersecurity toolkit. While SAST focuses on finding vulnerabilities in the code during development, DAST tests the application in its live environment to uncover real-world risks.</p>
<p>By combining SAST and DAST, you can ensure your applications are secure from development to deployment. Understanding these tools and their benefits is a step toward creating a safer digital world.</p>
]]></content:encoded></item><item><title><![CDATA[Understanding DAST: A Simple Guide with Tool Examples]]></title><description><![CDATA[Introduction
In the world of software development, ensuring security is crucial. One effective method to identify and fix security issues is called DAST (Dynamic Application Security Testing). Let's explore what DAST is and how it helps keep software...]]></description><link>https://shesecures.in/understanding-dast-a-simple-guide-with-tool-examples</link><guid isPermaLink="true">https://shesecures.in/understanding-dast-a-simple-guide-with-tool-examples</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Vulnerability management]]></category><category><![CDATA[DAST]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Thu, 10 Apr 2025 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/jLwVAUtLOAQ/upload/094f01f044dcbb3a717ff63173929da0.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>In the world of software development, ensuring security is crucial. One effective method to identify and fix security issues is called DAST (Dynamic Application Security Testing). Let's explore what DAST is and how it helps keep software secure.</p>
<h4 id="heading-what-is-dast"><strong>What is DAST?</strong></h4>
<ul>
<li><p><strong>Layman’s Terms:</strong> DAST is like testing a car by driving it around to see if anything goes wrong. It checks the software while it's running.</p>
</li>
<li><p><strong>Explanation:</strong> DAST tests an application in its running state to find vulnerabilities that could be exploited by attackers. It simulates real-world attacks to identify security weaknesses and ensures the application behaves as expected under various conditions.</p>
</li>
</ul>
<h4 id="heading-how-does-dast-work"><strong>How Does DAST Work?</strong></h4>
<p>DAST tools interact with the application while it is running and perform various tests to identify security vulnerabilities, such as:</p>
<ul>
<li><p><strong>SQL Injection:</strong> When an attacker can manipulate a query to the database through user inputs.</p>
</li>
<li><p><strong>Cross-Site Scripting (XSS):</strong> When an attacker can inject malicious scripts into web pages viewed by other users.</p>
</li>
<li><p><strong>Broken Authentication:</strong> When an attacker can exploit flaws in the authentication mechanism to gain unauthorized access.</p>
</li>
</ul>
<h4 id="heading-why-is-dast-important"><strong>Why is DAST Important?</strong></h4>
<ul>
<li><p><strong>Real-World Testing:</strong> DAST mimics how attackers would interact with the application, providing a realistic assessment of its security.</p>
</li>
<li><p><strong>Runtime Analysis:</strong> Since DAST tests the application while it is running, it can identify vulnerabilities that only appear during execution.</p>
</li>
<li><p><strong>Comprehensive Coverage:</strong> DAST helps uncover security issues across different layers of the application, including the user interface, API, and server-side components.</p>
</li>
</ul>
<h4 id="heading-examples-of-dast-tools"><strong>Examples of DAST Tools</strong></h4>
<ol>
<li><p><strong>Acunetix:</strong></p>
<ul>
<li><p><strong>Description:</strong> Acunetix is a web vulnerability scanner that detects and reports on a wide range of security issues.</p>
</li>
<li><p><strong>Features:</strong> Automated scanning, detailed reports, and remediation guidance for web applications.</p>
</li>
</ul>
</li>
<li><p><strong>OWASP ZAP (Zed Attack Proxy):</strong></p>
<ul>
<li><p><strong>Description:</strong> OWASP ZAP is an open-source tool that helps find security vulnerabilities in web applications.</p>
</li>
<li><p><strong>Features:</strong> Active and passive scanning, automated and manual testing, and integration with CI/CD pipelines.</p>
</li>
</ul>
</li>
<li><p><strong>Netsparker:</strong></p>
<ul>
<li><p><strong>Description:</strong> Netsparker is an automated web application security scanner that identifies vulnerabilities and provides actionable insights.</p>
</li>
<li><p><strong>Features:</strong> Accurate scanning, detailed reports, and integration with issue tracking systems.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>DAST is a crucial part of a comprehensive security strategy, as it helps identify and fix vulnerabilities in a running application. By using DAST tools like Acunetix, OWASP ZAP, and Netsparker, organizations can ensure their software is secure and resilient against real-world attacks. Understanding DAST and its benefits can help organizations build more secure and reliable software.</p>
]]></content:encoded></item><item><title><![CDATA[Understanding SAST: A Simple Guide with Tool Examples]]></title><description><![CDATA[Introduction
In the world of software development, security is a top priority. One method to ensure software is safe from vulnerabilities is called SAST (Static Application Security Testing). Let's explore what SAST is and how it helps keep software ...]]></description><link>https://shesecures.in/understanding-sast-a-simple-guide-with-tool-examples</link><guid isPermaLink="true">https://shesecures.in/understanding-sast-a-simple-guide-with-tool-examples</guid><category><![CDATA[Vulnerability management]]></category><category><![CDATA[SAST]]></category><category><![CDATA[#cybersecurity]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Sat, 05 Apr 2025 18:30:00 GMT</pubDate><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>In the world of software development, security is a top priority. One method to ensure software is safe from vulnerabilities is called SAST (Static Application Security Testing). Let's explore what SAST is and how it helps keep software secure.</p>
<h4 id="heading-what-is-sast"><strong>What is SAST?</strong></h4>
<ul>
<li><p>SAST is like proofreading a book before it's published. It checks the code for mistakes and security issues without actually running the software.</p>
</li>
<li><p><strong>Explanation:</strong> SAST analyses the source code, byte code, or binary code of an application to find security vulnerabilities. It does this without executing the program, making it a proactive approach to identifying issues early in the development process.</p>
</li>
</ul>
<h4 id="heading-how-does-sast-work"><strong>How Does SAST Work?</strong></h4>
<p>SAST tools scan the codebase of an application to identify potential security vulnerabilities, such as:</p>
<ul>
<li><p><strong>SQL Injection:</strong> A flaw that allows attackers to interfere with the queries an application makes to its database.</p>
</li>
<li><p><strong>Cross-Site Scripting (XSS):</strong> A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.</p>
</li>
<li><p><strong>Buffer Overflows:</strong> Errors that occur when an application writes more data to a buffer than it can hold, potentially leading to a system crash or allowing an attacker to execute arbitrary code.</p>
</li>
</ul>
<h4 id="heading-why-is-sast-important"><strong>Why is SAST Important?</strong></h4>
<ul>
<li><p><strong>Early Detection:</strong> SAST identifies vulnerabilities early in the development process, allowing developers to fix issues before the software is deployed.</p>
</li>
<li><p><strong>Cost-Effective:</strong> Fixing vulnerabilities early is generally cheaper and less disruptive than addressing them after deployment.</p>
</li>
<li><p><strong>Improved Code Quality:</strong> SAST not only helps identify security issues but also improves the overall quality of the code by highlighting coding errors and best practices.</p>
</li>
</ul>
<h4 id="heading-examples-of-sast-tools"><strong>Examples of SAST Tools</strong></h4>
<ol>
<li><p><strong>Checkmarx:</strong></p>
<ul>
<li><p><strong>Description:</strong> Checkmarx is a widely-used SAST tool that scans code for security vulnerabilities and provides detailed reports to help developers fix issues.</p>
</li>
<li><p><strong>Features:</strong> Supports multiple programming languages, integrates with development environments, and provides actionable insights.</p>
</li>
</ul>
</li>
<li><p><strong>SonarQube:</strong></p>
<ul>
<li><p><strong>Description:</strong> SonarQube is an open-source platform that continuously inspects code quality and security.</p>
</li>
<li><p><strong>Features:</strong> Detects vulnerabilities, bugs, and code smells; provides detailed analysis; integrates with CI/CD pipelines.</p>
</li>
</ul>
</li>
<li><p><strong>Veracode:</strong></p>
<ul>
<li><p><strong>Description:</strong> Veracode offers comprehensive security analysis and integrates with development workflows to help identify and fix vulnerabilities.</p>
</li>
<li><p><strong>Features:</strong> Scans code in various languages, offers remediation guidance, and supports DevSecOps practices.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>SAST is an essential part of the software development process, helping to identify and fix security vulnerabilities early. By using SAST tools like Checkmarx, SonarQube, and Veracode, developers can ensure their code is secure and of high quality. Understanding SAST and its benefits can help organizations build more secure and reliable software.</p>
]]></content:encoded></item><item><title><![CDATA[The OWASP Top 10: A Simple Guide to Common Security Risks (2017 Edition)]]></title><description><![CDATA[Introduction
In the digital world, keeping applications secure is crucial. The OWASP Top 10 is a list of the most common security risks for web applications. Understanding these risks can help you protect your applications from cyber-attacks. Let's e...]]></description><link>https://shesecures.in/the-owasp-top-10-a-simple-guide-to-common-security-risks</link><guid isPermaLink="true">https://shesecures.in/the-owasp-top-10-a-simple-guide-to-common-security-risks</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[owasp]]></category><category><![CDATA[WomenWhoTech]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Wed, 12 Mar 2025 06:03:41 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/xG8IQMqMITM/upload/3c13784b6f21ac41850e40da9eb42dee.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>In the digital world, keeping applications secure is crucial. The OWASP Top 10 is a list of the most common security risks for web applications. Understanding these risks can help you protect your applications from cyber-attacks. Let's explore the OWASP Top 10 in simple terms.</p>
<p>There are three new categories, four categories with naming and scoping changes, and some consolidation in the Top 10 for 2017.</p>
<h3 id="heading-1-injection"><strong>1. Injection</strong></h3>
<ul>
<li><p>Injection is like letting someone fill out a form with harmful data that messes up your system.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> This occurs when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.</p>
</li>
<li><p><strong>Example:</strong> An attacker uses SQL injection to manipulate a query by entering malicious code into a login form, bypassing authentication, and gaining access to the database.</p>
</li>
</ul>
<h3 id="heading-2-broken-authentication"><strong>2. Broken Authentication</strong></h3>
<ul>
<li><p>Broken authentication is like having weak locks on your doors, making it easy for intruders to get in.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> This happens when authentication mechanisms are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens to assume the identity of other users.</p>
</li>
<li><p><strong>Example:</strong> An attacker exploits weak password policies to guess or brute-force passwords and gain unauthorized access to user accounts.</p>
</li>
</ul>
<h3 id="heading-3-sensitive-data-exposure"><strong>3. Sensitive Data Exposure</strong></h3>
<ul>
<li><p>Sensitive data exposure is like leaving your personal information out in the open for anyone to see.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> Sensitive data exposure occurs when applications do not adequately protect sensitive information, such as financial data, healthcare data, or personal identifiers. This can lead to data breaches and unauthorized access.</p>
</li>
<li><p><strong>Example:</strong> An application stores credit card information in plain text, which is then stolen by an attacker through a data breach.</p>
</li>
</ul>
<h3 id="heading-4-xml-external-entities-xxe"><strong>4. XML External Entities (XXE)</strong></h3>
<ul>
<li><p>XXE is like letting an unknown guest into your house through a hidden door.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> XXE occurs when an XML parser improperly processes external entities within XML documents, allowing attackers to exploit vulnerabilities to access internal files, systems, or execute malicious code.</p>
</li>
<li><p><strong>Example:</strong> An attacker crafts a malicious XML input containing external entity references that cause the application to expose internal files or network resources.</p>
</li>
</ul>
<h3 id="heading-5-broken-access-control"><strong>5. Broken Access Control</strong></h3>
<ul>
<li><p>Broken access control is like giving everyone the keys to every room in your house.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> This happens when access control policies are not enforced, allowing unauthorized users to access restricted areas or perform actions they shouldn’t be able to.</p>
</li>
<li><p><strong>Example:</strong> An attacker manipulates URL parameters to access restricted admin functionalities without proper authorization.</p>
</li>
</ul>
<h3 id="heading-6-security-misconfiguration"><strong>6. Security Misconfiguration</strong></h3>
<ul>
<li><p>Security misconfiguration is like leaving your doors and windows unlocked.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> Security misconfiguration occurs when security settings are not defined, implemented, or maintained correctly. This can include default settings, unnecessary features, or unpatched vulnerabilities.</p>
</li>
<li><p><strong>Example:</strong> An application uses default credentials for its admin panel, which are easily exploited by attackers.</p>
</li>
</ul>
<h3 id="heading-7-cross-site-scripting-xss"><strong>7. Cross-Site Scripting (XSS)</strong></h3>
<ul>
<li><p>XSS is like letting someone sneak a harmful note into your notebook.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> XSS occurs when an application allows untrusted data to be included in a web page without proper validation or escaping. This enables attackers to execute malicious scripts in the user’s browser.</p>
</li>
<li><p><strong>Example:</strong> An attacker injects malicious JavaScript into a comment section, which is then executed when other users view the comment.</p>
</li>
</ul>
<h3 id="heading-8-insecure-deserialization"><strong>8. Insecure Deserialization</strong></h3>
<ul>
<li><p>Insecure deserialization is like putting together a broken puzzle that can cause unexpected problems.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> Insecure deserialization occurs when untrusted data is used to instantiate objects, leading to the execution of arbitrary code or other attacks. This can lead to remote code execution, privilege escalation, and other security issues.</p>
</li>
<li><p><strong>Example:</strong> An attacker manipulates serialized data to exploit vulnerabilities and execute malicious code on the server.</p>
</li>
</ul>
<h3 id="heading-9-using-components-with-known-vulnerabilities"><strong>9. Using Components with Known Vulnerabilities</strong></h3>
<ul>
<li><p>Using components with known vulnerabilities is like building a house with faulty materials.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> This happens when applications use libraries, frameworks, or other software components that have known security vulnerabilities. Attackers can exploit these vulnerabilities to compromise the application.</p>
</li>
<li><p><strong>Example:</strong> An application uses an outdated version of a library with a known security flaw, which is then exploited by an attacker.</p>
</li>
</ul>
<h3 id="heading-10-insufficient-logging-and-monitoring"><strong>10. Insufficient Logging and Monitoring</strong></h3>
<ul>
<li><p>Insufficient logging and monitoring is like having no security cameras to see what's happening.</p>
</li>
<li><p><strong>Detailed Explanation:</strong> Insufficient logging and monitoring occur when security events and incidents are not properly logged or monitored, making it difficult to detect and respond to attacks.</p>
</li>
<li><p><strong>Example:</strong> An attacker gains access to the system, but due to lack of logging and monitoring, the breach goes undetected for an extended period.</p>
</li>
</ul>
<p>Understanding these risks and how they can impact your applications is crucial for building secure software. By addressing these vulnerabilities, you can better protect your applications and keep your data safe.</p>
]]></content:encoded></item><item><title><![CDATA[Understanding the MITRE Framework and MITRE ATT&CK: A Simple Guide]]></title><description><![CDATA[Introduction
In the world of cybersecurity, two important concepts help organizations protect their systems from cyber threats: the MITRE Framework and MITRE ATT&CK. Let's explore what these terms mean and how they help keep our digital environments ...]]></description><link>https://shesecures.in/understanding-the-mitre-framework-and-mitre-attandck-a-simple-guide</link><guid isPermaLink="true">https://shesecures.in/understanding-the-mitre-framework-and-mitre-attandck-a-simple-guide</guid><category><![CDATA[mitre-attack]]></category><category><![CDATA[#cybersecurity]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Wed, 05 Mar 2025 07:04:07 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/70Rir5vB96U/upload/59514ca3c232b0e85fe4949059fbadef.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>In the world of cybersecurity, two important concepts help organizations protect their systems from cyber threats: the MITRE Framework and MITRE ATT&amp;CK. Let's explore what these terms mean and how they help keep our digital environments secure.</p>
<h4 id="heading-what-is-the-mitre-framework"><strong>What is the MITRE Framework?</strong></h4>
<ul>
<li><p>The MITRE Framework is like a big encyclopaedia of cyber threats and how to defend against them.</p>
</li>
<li><p><strong>Explanation:</strong> The MITRE Framework is a comprehensive collection of information about various cybersecurity threats and defence strategies. It helps organizations understand the tactics, techniques, and procedures (TTPs) used by attackers and provides guidance on how to protect against them.</p>
</li>
</ul>
<h4 id="heading-what-is-mitre-attampck"><strong>What is MITRE ATT&amp;CK?</strong></h4>
<ul>
<li><p>MITRE ATT&amp;CK is like a playbook that shows how attackers try to break into systems and what you can do to stop them.</p>
</li>
<li><p><strong>Explanation:</strong> MITRE ATT&amp;CK (Adversarial Tactics, Techniques, and Common Knowledge) is a detailed knowledge base of the behaviours and methods used by cyber attackers. It includes descriptions of the tactics (goals), techniques (methods), and procedures (specific actions) that attackers use at different stages of an attack.</p>
</li>
</ul>
<h4 id="heading-how-does-mitre-attampck-work"><strong>How Does MITRE ATT&amp;CK Work?</strong></h4>
<p>MITRE ATT&amp;CK is organized into matrices that categorize different tactics and techniques used by attackers. Here are some key components:</p>
<ol>
<li><p><strong>Tactics:</strong></p>
<ul>
<li><p>Tactics are the goals that attackers want to achieve.</p>
</li>
<li><p><strong>Example:</strong> Gaining initial access to a system, stealing sensitive data, or maintaining persistence.</p>
</li>
</ul>
</li>
<li><p><strong>Techniques:</strong></p>
<ul>
<li><p>Techniques are the methods attackers use to achieve their goals.</p>
</li>
<li><p><strong>Example:</strong> Phishing emails, exploiting software vulnerabilities, or using malware.</p>
</li>
</ul>
</li>
<li><p><strong>Procedures:</strong></p>
<ul>
<li><p>Procedures are the specific actions attackers take to execute their techniques.</p>
</li>
<li><p><strong>Example:</strong> Sending a phishing email with a malicious attachment to gain access to a system.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-why-is-mitre-attampck-important"><strong>Why is MITRE ATT&amp;CK Important?</strong></h4>
<ul>
<li><p><strong>Improved Threat Detection:</strong> By understanding the tactics and techniques used by attackers, organizations can better detect and respond to threats.</p>
</li>
<li><p><strong>Enhanced Security Posture:</strong> MITRE ATT&amp;CK helps organizations identify gaps in their security defences and implement effective countermeasures.</p>
</li>
<li><p><strong>Standardized Language:</strong> It provides a common language for security professionals to discuss and address cyber threats.</p>
</li>
</ul>
<h4 id="heading-examples-of-mitre-attampck-techniques"><strong>Examples of MITRE ATT&amp;CK Techniques</strong></h4>
<ol>
<li><p><strong>Phishing:</strong></p>
<ul>
<li><p>Phishing is like sending fake emails to trick people into giving away their passwords.</p>
</li>
<li><p><strong>Explanation:</strong> Attackers send deceptive emails to lure victims into clicking on malicious links or providing sensitive information.</p>
</li>
</ul>
</li>
<li><p><strong>Credential Dumping:</strong></p>
<ul>
<li><p>Credential dumping is like stealing the keys to a building to get inside.</p>
</li>
<li><p><strong>Explanation:</strong> Attackers extract login credentials from a compromised system to gain unauthorized access to other systems.</p>
</li>
</ul>
</li>
<li><p><strong>Lateral Movement:</strong></p>
<ul>
<li><p>Lateral movement is like moving from one room to another inside a building to find valuable items.</p>
</li>
<li><p><strong>Explanation:</strong> Attackers move within a network to access additional systems and data after gaining initial access.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>Understanding the MITRE Framework and MITRE ATT&amp;CK can help organizations better protect their systems from cyber threats. By learning about the tactics and techniques used by attackers, organizations can improve their threat detection and response capabilities, ultimately enhancing their overall security posture.</p>
<p>You can find more information on the <a target="_blank" href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> website.</p>
]]></content:encoded></item><item><title><![CDATA[Vulnerability Management vs. Vulnerability Assessment: What's the Difference?]]></title><description><![CDATA[Introduction
In the world of cybersecurity, two important processes help keep our digital environments safe: vulnerability management and vulnerability assessment. While these terms are often used together, they have distinct roles.
Let’s break down ...]]></description><link>https://shesecures.in/vulnerability-management-vs-vulnerability-assessment-whats-the-difference</link><guid isPermaLink="true">https://shesecures.in/vulnerability-management-vs-vulnerability-assessment-whats-the-difference</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[vulnerability]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Tue, 04 Mar 2025 06:51:18 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/3TU34jaW88k/upload/5e9d0a037f293fe7288a221e08972c01.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>In the world of cybersecurity, two important processes help keep our digital environments safe: vulnerability management and vulnerability assessment. While these terms are often used together, they have distinct roles.</p>
<p>Let’s break down what each term means and how they differ in a way that's easy to understand.</p>
<h4 id="heading-vulnerability-assessment"><strong>Vulnerability Assessment</strong></h4>
<ul>
<li><p>Vulnerability assessment is like a health check-up for your computer systems.</p>
</li>
<li><p>A vulnerability assessment is a one-time process that identifies and evaluates security weaknesses in your IT systems.</p>
</li>
<li><p>It helps you understand where your systems are vulnerable to potential attacks and provides a snapshot of your security posture at a specific moment in time.</p>
</li>
</ul>
<p><strong>Key Points:</strong></p>
<ul>
<li><p><strong>Purpose:</strong> To identify and evaluate security weaknesses.</p>
</li>
<li><p><strong>Frequency:</strong> Conducted periodically, such as quarterly or annually.</p>
</li>
<li><p><strong>Output:</strong> A report detailing discovered vulnerabilities and their severity.</p>
</li>
</ul>
<h4 id="heading-vulnerability-management"><strong>Vulnerability Management</strong></h4>
<ul>
<li><p>Vulnerability management is like maintaining a healthy lifestyle to keep your body fit and strong.</p>
</li>
<li><p>Vulnerability management is an ongoing process that continuously identifies, assesses, prioritizes, and remediates vulnerabilities.</p>
</li>
<li><p>It involves regular scans, monitoring, and updating security measures to ensure your systems remain secure over time.</p>
</li>
</ul>
<p><strong>Key Points:</strong></p>
<ul>
<li><p><strong>Purpose:</strong> To continuously manage and mitigate security risks.</p>
</li>
<li><p><strong>Frequency:</strong> An ongoing, continuous process.</p>
</li>
<li><p><strong>Output:</strong> Regular updates and reports on vulnerabilities, remediation actions taken, and overall security improvements.</p>
</li>
</ul>
<h4 id="heading-key-differences"><strong>Key Differences</strong></h4>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Aspect</strong></td><td><strong>Vulnerability Assessment</strong></td><td><strong>Vulnerability Management</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Scope</strong></td><td>Snapshot evaluation of vulnerabilities at a specific point in time</td><td>Continuous process with regular assessments, monitoring, and remediation</td></tr>
<tr>
<td><strong>Approach</strong></td><td>Identifies vulnerabilities and provides a report with recommendations</td><td>Identifies, prioritizes, and fixes vulnerabilities on an ongoing basis</td></tr>
<tr>
<td><strong>Goal</strong></td><td>One-time evaluation of security weaknesses</td><td>Maintain and improve security posture over time by continuously addressing vulnerabilities</td></tr>
<tr>
<td><strong>Tools</strong></td><td>Tools like scanners and assessment platforms to identify vulnerabilities</td><td>Comprehensive tools and processes including scanning, remediation tracking, and continuous monitoring</td></tr>
</tbody>
</table>
</div><h4 id="heading-examples-of-tools"><strong>Examples of Tools</strong></h4>
<ol>
<li><p><strong>Qualys Vulnerability Management:</strong> A platform that provides continuous monitoring, assessment, and remediation of vulnerabilities.</p>
</li>
<li><p><strong>Nessus:</strong> A vulnerability assessment tool that scans systems for security weaknesses and provides detailed reports.</p>
</li>
<li><p><strong>Rapid7 InsightVM:</strong> A tool that offers both vulnerability assessment and management capabilities, helping organizations identify and remediate vulnerabilities continuously.</p>
</li>
</ol>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>Understanding the difference between vulnerability assessment and vulnerability management is crucial for maintaining a secure IT environment. Vulnerability assessment provides a snapshot of security weaknesses, while vulnerability management is an ongoing process that continuously addresses and mitigates risks. Both are essential for a comprehensive security strategy that keeps your digital assets safe.</p>
]]></content:encoded></item><item><title><![CDATA[Cybersecurity vs. Information Security: What's the Difference?]]></title><description><![CDATA[Introduction
When it comes to protecting our digital world, you may have heard the terms "cybersecurity" and "information security" thrown around. While they are often used interchangeably, they aren't exactly the same. Let's dive into what each term...]]></description><link>https://shesecures.in/cybersecurity-vs-information-security-whats-the-difference</link><guid isPermaLink="true">https://shesecures.in/cybersecurity-vs-information-security-whats-the-difference</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[information security]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Tue, 04 Mar 2025 02:30:15 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/EUsVwEOsblE/upload/a1ebcdfb00711c2872751671def3790c.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>When it comes to protecting our digital world, you may have heard the terms "cybersecurity" and "information security" thrown around. While they are often used interchangeably, they aren't exactly the same. Let's dive into what each term means and how they differ, in a way that's easy to understand.</p>
<h4 id="heading-cybersecurity"><strong>Cybersecurity</strong></h4>
<ul>
<li><p>Cybersecurity is like being the guardian of your entire digital kingdom.</p>
</li>
<li><p><strong>Explanation:</strong> It focuses on protecting computers, networks, and data from cyber-attacks. This includes securing everything connected to the internet, like your computer, smartphone, and even smart home devices, from hackers and other malicious threats.</p>
</li>
</ul>
<h4 id="heading-information-security"><strong>Information Security</strong></h4>
<ul>
<li><p>Information security is like keeping all your important secrets safe, whether they are in a physical diary or stored on a computer.</p>
</li>
<li><p><strong>Explanation:</strong> It focuses on protecting any form of information, whether it's digital or physical. This includes ensuring that sensitive information like personal data, financial records, and confidential documents are kept secure from unauthorized access, disclosure, alteration, or destruction.</p>
</li>
</ul>
<h4 id="heading-key-differences"><strong>Key Differences</strong></h4>
<ol>
<li><p><strong>Scope</strong></p>
<ul>
<li><p><strong>Cybersecurity:</strong> Primarily concerned with defending against cyber-attacks and threats to digital systems and networks.</p>
</li>
<li><p><strong>Information Security:</strong> Encompasses a broader range, including the protection of both digital and physical information.</p>
</li>
</ul>
</li>
<li><p><strong>Focus</strong></p>
<ul>
<li><p><strong>Cybersecurity:</strong> Focuses on technologies and processes to safeguard systems, networks, and data from cyber threats.</p>
</li>
<li><p><strong>Information Security:</strong> Focuses on protecting the confidentiality, integrity, and availability of information in all forms.</p>
</li>
</ul>
</li>
<li><p><strong>Tools and Techniques</strong></p>
<ul>
<li><p><strong>Cybersecurity:</strong> Uses tools like firewalls, antivirus software, intrusion detection systems, and encryption to protect against cyber threats.</p>
</li>
<li><p><strong>Information Security:</strong> Includes policies, procedures, and physical security measures in addition to cybersecurity tools to protect information.</p>
</li>
</ul>
</li>
<li><p><strong>Examples</strong></p>
<ul>
<li><p><strong>Cybersecurity:</strong> Protecting your computer from viruses, securing your Wi-Fi network, and preventing hackers from accessing your online accounts.</p>
</li>
<li><p><strong>Information Security:</strong> Safeguarding physical documents, ensuring that only authorized personnel can access certain information, and implementing strong password policies.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>While cybersecurity and information security share a common goal of protecting our digital world, they differ in scope and focus. Cybersecurity zeroes in on defending against cyber threats, while information security takes a broader approach to protect all forms of information. Understanding these differences helps us better appreciate the various layers of protection that keep our data and systems safe.</p>
]]></content:encoded></item><item><title><![CDATA[Understanding Cybersecurity: A Simple Guide to Basic Terms]]></title><description><![CDATA[1. What is Cybersecurity?

Cybersecurity is like having a security system for your house, but instead of protecting your home, it protects your computer, smartphone, and all your online information from bad guys (hackers).

2. Virus

A virus in the d...]]></description><link>https://shesecures.in/understanding-cybersecurity-a-simple-guide-to-basic-terms</link><guid isPermaLink="true">https://shesecures.in/understanding-cybersecurity-a-simple-guide-to-basic-terms</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Mon, 03 Mar 2025 16:09:53 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/GnvurwJsKaY/upload/e0db6db31b641e305c7124b886c6aadf.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-1-what-is-cybersecurity"><strong>1. What is Cybersecurity?</strong></h4>
<ul>
<li>Cybersecurity is like having a security system for your house, but instead of protecting your home, it protects your computer, smartphone, and all your online information from bad guys (hackers).</li>
</ul>
<h4 id="heading-2-virus"><strong>2. Virus</strong></h4>
<ul>
<li>A virus in the digital world is like catching a cold. It's a harmful program that spreads and causes problems for your computer or other devices.</li>
</ul>
<h4 id="heading-3-malware"><strong>3. Malware</strong></h4>
<ul>
<li>Malware is any software created to harm your computer or steal your information. Think of it as different types of bad guys—viruses, worms, and trojans—each with their own nasty tricks.</li>
</ul>
<h4 id="heading-4-firewall"><strong>4. Firewall</strong></h4>
<ul>
<li>A firewall is like a security guard for your computer. It stands between your computer and the internet, blocking harmful stuff from getting in.</li>
</ul>
<h4 id="heading-5-phishing"><strong>5. Phishing</strong></h4>
<ul>
<li>Phishing is when someone tries to trick you into giving away your personal information, like passwords or credit card numbers, by pretending to be someone you trust (like your bank).</li>
</ul>
<h4 id="heading-6-encryption"><strong>6. Encryption</strong></h4>
<ul>
<li>Encryption is like putting your important information in a locked box. Only someone with the right key (password) can open it and read the information.</li>
</ul>
<h4 id="heading-7-two-factor-authentication-2fa"><strong>7. Two-Factor Authentication (2FA)</strong></h4>
<ul>
<li>2FA is like using a password plus a fingerprint or a code sent to your phone to double-check that it’s really you trying to access your account.</li>
</ul>
<h4 id="heading-8-ransomware"><strong>8. Ransomware</strong></h4>
<ul>
<li>Ransomware is like a digital kidnapper. It locks your computer or files and demands money (ransom) to give them back to you.</li>
</ul>
<h4 id="heading-9-spyware"><strong>9. Spyware</strong></h4>
<ul>
<li>Spyware is like a sneaky spy. It hides on your computer and secretly collects information about what you're doing.</li>
</ul>
<h4 id="heading-10-ddos-attack-distributed-denial-of-service"><strong>10. DDoS Attack (Distributed Denial of Service)</strong></h4>
<ul>
<li>A DDoS attack is when a bunch of devices overwhelm a website with too many requests, causing it to crash and become unavailable.</li>
</ul>
<h4 id="heading-11-vpn-virtual-private-network"><strong>11. VPN (Virtual Private Network)</strong></h4>
<ul>
<li>A VPN is like a private tunnel for your internet traffic. It hides your online activities from prying eyes and keeps your data safe when you're using public Wi-Fi.</li>
</ul>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>Understanding these basic cybersecurity terms can help you better protect yourself in the digital world. Just like knowing how to lock your doors and windows keeps your home safe, knowing these terms helps keep your online life secure.</p>
<p>Thanks for reading:)</p>
]]></content:encoded></item><item><title><![CDATA[A Beginner’s Guide to Vulnerability Management]]></title><description><![CDATA[Introduction
Imagine your computer or smartphone as a castle, filled with valuable treasures (your data and personal information). In the world of cybersecurity, the term "vulnerability" refers to any weak points in the castle walls or defences that ...]]></description><link>https://shesecures.in/a-beginners-guide-to-vulnerability-management</link><guid isPermaLink="true">https://shesecures.in/a-beginners-guide-to-vulnerability-management</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Vulnerability management]]></category><category><![CDATA[vulnerability]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Sun, 02 Mar 2025 13:38:28 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/FHnnjk1Yj7Y/upload/69ba78858ac0e66128c860b0367d0320.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-introduction"><strong>Introduction</strong></h4>
<p>Imagine your computer or smartphone as a castle, filled with valuable treasures (your data and personal information). In the world of cybersecurity, the term "vulnerability" refers to any weak points in the castle walls or defences that could allow intruders (hackers) to break in and steal your treasures. Vulnerability management is like having a team of experts who regularly check the castle walls, find the weak spots, and fix them to keep the intruders out.</p>
<h4 id="heading-what-is-vulnerability-management"><strong>What is Vulnerability Management?</strong></h4>
<p>Vulnerability management is a continuous process of identifying, assessing, prioritizing, and fixing security weaknesses (vulnerabilities) in your IT systems. This helps to protect your devices, networks, and data from cyber-attacks.</p>
<h4 id="heading-key-steps-in-vulnerability-management"><strong>Key Steps in Vulnerability Management</strong></h4>
<ol>
<li><p><strong>Discovery</strong></p>
<ul>
<li><p>Find the weak spots in your castle walls.</p>
</li>
<li><p><strong>Explanation:</strong> This involves using tools to scan and discover all the devices, applications, and systems in your network to identify any vulnerabilities.</p>
</li>
</ul>
</li>
<li><p><strong>Assessment</strong></p>
<ul>
<li><p>Figure out how serious the weak spots are.</p>
</li>
<li><p><strong>Explanation:</strong> Evaluate the discovered vulnerabilities to determine their potential impact and how easily they can be exploited by hackers.</p>
</li>
</ul>
</li>
<li><p><strong>Prioritization</strong></p>
<ul>
<li><p>Decide which weak spots to fix first.</p>
</li>
<li><p><strong>Explanation:</strong> Based on the assessment, prioritize vulnerabilities based on their severity and the potential damage they could cause if exploited.</p>
</li>
</ul>
</li>
<li><p><strong>Remediation</strong></p>
<ul>
<li><p>Fix the weak spots.</p>
</li>
<li><p><strong>Explanation:</strong> Apply patches, updates, or other fixes to eliminate the vulnerabilities and strengthen the defences.</p>
</li>
</ul>
</li>
<li><p><strong>Verification</strong></p>
<ul>
<li><p>Check if the weak spots are properly fixed.</p>
</li>
<li><p><strong>Explanation:</strong> Verify that the applied fixes have successfully resolved the vulnerabilities without causing new issues.</p>
</li>
</ul>
</li>
<li><p><strong>Reporting</strong></p>
<ul>
<li><p>Keep a record of what was fixed.</p>
</li>
<li><p><strong>Explanation:</strong> Document the identified vulnerabilities, the actions taken to fix them, and the overall improvement in security.</p>
</li>
</ul>
</li>
</ol>
<h4 id="heading-why-is-vulnerability-management-important"><strong>Why is Vulnerability Management Important?</strong></h4>
<ul>
<li><p><strong>Protection:</strong> It helps protect your data and systems from being exploited by cybercriminals.</p>
</li>
<li><p><strong>Compliance:</strong> Many industries have regulations that require regular vulnerability management to ensure data security.</p>
</li>
<li><p><strong>Reputation:</strong> A successful cyber-attack can damage your reputation, while good vulnerability management shows you’re proactive about security.</p>
</li>
</ul>
<h4 id="heading-conclusion"><strong>Conclusion</strong></h4>
<p>Vulnerability management is like having a diligent team that constantly monitors and strengthens the defences of your digital castle. By identifying and fixing weaknesses, you can significantly reduce the risk of cyber-attacks and keep your valuable data safe.</p>
<p>Thanks for reading:)</p>
]]></content:encoded></item><item><title><![CDATA[Log Source Onboarding in QRadar: A Practical Checklist]]></title><description><![CDATA[Every time a new device, application, or cloud service enters your environment, it needs to talk to your SIEM. In IBM QRadar, that conversation happens through log sources and DSMs (Device Support Mod]]></description><link>https://shesecures.in/log-source-onboarding-in-qradar-a-practical-checklist</link><guid isPermaLink="true">https://shesecures.in/log-source-onboarding-in-qradar-a-practical-checklist</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[WomenInTech]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Sat, 11 Jan 2025 05:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/6437dc07f45711ac5aaa985e/50ddd59b-f62a-4372-81e3-745a2f6327ae.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every time a new device, application, or cloud service enters your environment, it needs to talk to your SIEM. In IBM QRadar, that conversation happens through log sources and DSMs (Device Support Modules). Getting this right is foundational — events that reach QRadar but are never parsed, categorized, or mapped to QRadar IDs cannot be used in any correlation rule. They show up in Log Activity, give you a false sense of coverage, and contribute nothing to detection.</p>
<h3>The full onboarding checklist</h3>
<table style="min-width:209px"><colgroup><col style="width:159px"></col><col style="min-width:25px"></col><col style="min-width:25px"></col></colgroup><tbody><tr><td><p><strong>Step</strong></p></td><td><p><strong>What to do</strong></p></td><td><p><strong>Common mistake</strong></p></td></tr><tr><td><p>1. Identify the log format</p></td><td><p>Syslog, LEEF, CEF, JDBC, API pull?</p></td><td><p>Assuming all Linux systems send identical syslog</p></td></tr><tr><td><p>2. Check DSM availability</p></td><td><p>Does QRadar have a native DSM for this device?</p></td><td><p>Skipping this and using Universal DSM blindly</p></td></tr><tr><td><p>3. Configure the source device</p></td><td><p>Enable logging, set correct facility/severity</p></td><td><p>Logging to wrong syslog facility (local0 vs local7)</p></td></tr><tr><td><p>4. Set the log source in QRadar</p></td><td><p>Correct protocol, listener port, timezone</p></td><td><p>Timezone mismatch shifts all event timestamps</p></td></tr><tr><td><p>5. Validate parsing</p></td><td><p>Check QRadar log activity — are events categorized?</p></td><td><p>Events showing as "unknown" — DSM not mapping fields</p></td></tr><tr><td><p>6. Map to QID</p></td><td><p>Ensure events have QRadar Event IDs (QIDs)</p></td><td><p>Unparsed events cannot be used in any rule</p></td></tr><tr><td><p>7. Test with a rule</p></td><td><p>Write a simple test rule and verify it fires</p></td><td><p>Assuming "I see events" means correlation works</p></td></tr></tbody></table>

<h3>Understanding log protocols in QRadar</h3>
<p>QRadar supports multiple collection protocols and choosing the wrong one is a common source of onboarding failures. Syslog (UDP/TCP) is the most common for network devices and Linux systems. LEEF (Log Event Extended Format) is IBM's own format, used by QRadar-aware products. CEF (Common Event Format) is used by many security products including Palo Alto, CrowdStrike, and others. JDBC is used for pulling logs directly from databases. Each protocol has specific listener port requirements and parsing behaviour in QRadar.</p>
<table style="min-width:75px"><colgroup><col style="min-width:25px"></col><col style="min-width:25px"></col><col style="min-width:25px"></col></colgroup><tbody><tr><td><p><strong>Protocol</strong></p></td><td><p><strong>Typical source</strong></p></td><td><p><strong>QRadar listener port</strong></p></td></tr><tr><td><p>Syslog UDP</p></td><td><p>Network devices, Linux, Unix</p></td><td><p>514</p></td></tr><tr><td><p>Syslog TCP</p></td><td><p>High-volume or reliable delivery needed</p></td><td><p>514 (configurable)</p></td></tr><tr><td><p>LEEF</p></td><td><p>IBM products, QRadar-native integrations</p></td><td><p>514 (via syslog)</p></td></tr><tr><td><p>CEF</p></td><td><p>Palo Alto, CrowdStrike, ArcSight agents</p></td><td><p>514 (via syslog)</p></td></tr><tr><td><p>JDBC</p></td><td><p>Databases, Oracle, MSSQL audit logs</p></td><td><p>Custom per data source</p></td></tr></tbody></table>

<h3>The Universal DSM trap</h3>
<p>When QRadar does not have a native DSM for a device, teams fall back to the Universal DSM. It will accept the logs. Events will appear in Log Activity. Everything looks fine. But fields like username, source IP, and event category will not be parsed correctly. A correlation rule looking for "failed authentication from external IP" cannot fire if QRadar does not know which raw log field contains the username. The Universal DSM is a placeholder, not a solution.</p>
<p><em>The right fix: build a custom Log Source Extension (LSE) that maps your device's raw log fields to QRadar's normalized fields. This takes time, but it is the only way to make the events usable in correlation.</em></p>
<h3>Timezone — the silent data quality killer</h3>
<p>This one causes more confusion than almost anything else in QRadar onboarding. If the log source device is in UTC but QRadar is configured to expect IST, every event timestamp will be off by 5 hours 30 minutes. This makes time-based correlation rules unreliable and makes forensic timelines inaccurate. Always verify the timezone configuration of the source device and match it exactly in the QRadar log source settings.</p>
<h3>Validating that onboarding actually worked</h3>
<p>Seeing events in Log Activity is not enough. True validation means confirming that events are correctly categorized (not showing as "Unknown"), that key fields like username and source IP are populated in normalized form, and that a simple test rule built on those events actually fires. Only then is the log source truly onboarded. Add it to your SIEM documentation with the onboarding date, DSM version, and the name of the analyst who validated it.</p>
<h3>Closing</h3>
<p>Log source onboarding is unglamorous work, but it is the foundation of every detection that comes after it. A SIEM with 200 connected log sources but 40 percent of them unparsed is not a 200-source SIEM — it is a 120-source SIEM with a misleading dashboard. Take the time to do it properly, document what you did, and validate before you move on.</p>
]]></content:encoded></item><item><title><![CDATA[QRadar to Sentinel Migration: What No One Tells You Before You Start]]></title><description><![CDATA[Every organization that has run IBM QRadar for years eventually faces the same conversation: "Should we move to Microsoft Sentinel?" It sounds straightforward on paper. In reality, it is one of the mo]]></description><link>https://shesecures.in/qradar-to-sentinel-migration-what-no-one-tells-you-before-you-start</link><guid isPermaLink="true">https://shesecures.in/qradar-to-sentinel-migration-what-no-one-tells-you-before-you-start</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[WomenInTech]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Wed, 25 Dec 2024 05:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/6437dc07f45711ac5aaa985e/130e4a53-498b-49ac-a56c-33ca9b1d5b4a.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every organization that has run IBM QRadar for years eventually faces the same conversation: "Should we move to Microsoft Sentinel?" It sounds straightforward on paper. In reality, it is one of the most underestimated migrations in the security space. This post is not a vendor comparison. It is a practitioner's honest account of what the journey actually looks like — the preparation required, the surprises along the way, and the decisions that determine whether the migration strengthens or weakens your detection capability.</p>
<h3>Why teams make the move</h3>
<p>The push usually comes from one of three directions — cost pressure on QRadar licensing, an organization-wide shift to Microsoft Azure, or a desire for a cloud-native SIEM that does not need dedicated on-prem appliances. Whichever the reason, the decision is rarely made by the security team alone. By the time the migration lands on the SOC's desk, it is already a business decision. The team's job is to execute it without losing detection coverage in the process.</p>
<h3>Platform comparison at a glance</h3>
<table style="min-width:75px"><colgroup><col style="min-width:25px"></col><col style="min-width:25px"></col><col style="min-width:25px"></col></colgroup><tbody><tr><td><p><strong>Area</strong></p></td><td><p><strong>QRadar</strong></p></td><td><p><strong>Sentinel</strong></p></td></tr><tr><td><p>Query language</p></td><td><p>AQL (Ariel Query Language)</p></td><td><p>KQL (Kusto Query Language)</p></td></tr><tr><td><p>Log ingestion model</p></td><td><p>DSMs on the QRadar console</p></td><td><p>Data Connectors, DCRs, CEF/Syslog</p></td></tr><tr><td><p>Correlation rules</p></td><td><p>Building Block + Rule framework</p></td><td><p>Analytics Rules (scheduled, NRT)</p></td></tr><tr><td><p>Offense/Alert concept</p></td><td><p>Offenses with magnitude score</p></td><td><p>Incidents via Analytic Rules</p></td></tr><tr><td><p>Search speed</p></td><td><p>Index-based, fast for recent data</p></td><td><p>Log Analytics workspace latency</p></td></tr><tr><td><p>Cost model</p></td><td><p>Appliance/EPS license</p></td><td><p>Pay-per-GB ingestion</p></td></tr><tr><td><p>Threat intelligence</p></td><td><p>X-Force integration</p></td><td><p>Microsoft Defender TI + MDTI</p></td></tr></tbody></table>

<h3>The query language gap is bigger than it looks</h3>
<p>AQL and KQL are not just different syntaxes — they reflect fundamentally different ways of thinking about log data. In QRadar, you filter first and then aggregate. In Sentinel, KQL pipelines everything in sequence. Analysts who have spent years writing AQL need real retraining time, not a weekend workshop. Plan for at least 4–6 weeks of KQL upskilling before your team can comfortably write and tune detection rules independently.</p>
<h3>What does not migrate automatically</h3>
<p>This is where most projects underestimate effort. Custom DSMs built for internal or niche applications have no Sentinel equivalent — you rebuild them as custom parsers using ASIM (Advanced Security Information Model). QRadar Offenses carry a magnitude score built from relevance, severity, and credibility — Sentinel Incidents do not replicate this automatically. Your triage logic needs to be rebuilt in Analytics Rules, Playbooks, or Workbooks before go-live. Reference data (watched lists, IP ranges, user groups) stored in QRadar reference sets must be migrated to Sentinel watchlists with careful validation.</p>
<h3>The four-phase migration approach</h3>
<table style="min-width:75px"><colgroup><col style="min-width:25px"></col><col style="min-width:25px"></col><col style="min-width:25px"></col></colgroup><tbody><tr><td><p><strong>Phase</strong></p></td><td><p><strong>Activity</strong></p></td><td><p><strong>Common failure point</strong></p></td></tr><tr><td><p>1 — Audit</p></td><td><p>Inventory log sources, active rules, retention needs</p></td><td><p>Skipping this leads to migrating unused noise</p></td></tr><tr><td><p>2 — Build</p></td><td><p>Recreate parsers, rules, watchlists in Sentinel</p></td><td><p>Underestimating ASIM parser effort for custom sources</p></td></tr><tr><td><p>3 — Parallel run</p></td><td><p>Both SIEMs live, alert parity comparison</p></td><td><p>Skipped to save cost — gaps appear post-cutover</p></td></tr><tr><td><p>4 — Cutover</p></td><td><p>QRadar decommission, Sentinel as system of record</p></td><td><p>Retention gaps if historical data is not archived</p></td></tr></tbody></table>

<h3><mark class="bg-yellow-200 dark:bg-yellow-500/30">The parallel run — do not skip it</mark></h3>
<p>Running both SIEMs simultaneously for 4–6 weeks is expensive and uncomfortable. It is also the most valuable phase of the migration. This is where you discover detections that exist in QRadar but were not recreated in Sentinel. That gap — between what you think you migrated and what you actually migrated — is where real incidents go undetected in the weeks after cutover.</p>
<p><em>A useful test: take the last 90 days of QRadar offenses and verify that each one would have triggered in Sentinel with the recreated rules. Any gap is a blind spot waiting to happen.</em></p>
<h3>Cost model shift — what finance needs to understand</h3>
<p>QRadar licensing is largely fixed — you pay for EPS (events per second) capacity. Sentinel's cost scales with ingestion volume, which means a sudden spike in log verbosity directly increases your bill. Set up ingestion cost alerts in Azure and review your data connector configurations carefully. Not every log source needs to feed into Sentinel at full verbosity — workspace transformation rules can filter at ingestion and reduce cost significantly.</p>
<h3>Closing</h3>
<p>QRadar to Sentinel is not a lift-and-shift. It is a redesign opportunity. Teams that approach it as a rebuild — with a clear log source inventory, a rule audit, a KQL learning plan, and a disciplined parallel run — come out with a leaner, better-tuned SIEM on the other side. The ones that rush it trade one set of detection gaps for another.</p>
]]></content:encoded></item><item><title><![CDATA[Security Operation Center]]></title><description><![CDATA[Security Operation Centre (SOC)
SOC is a team of cyber-security dedicated to monitoring and analysing an organization’s infrastructure 24/7 and the main responsibility of the SOC team is to respond to potential or current breaches. Also, the team is ...]]></description><link>https://shesecures.in/security-operation-center</link><guid isPermaLink="true">https://shesecures.in/security-operation-center</guid><category><![CDATA[Security]]></category><dc:creator><![CDATA[Megha BL]]></dc:creator><pubDate>Mon, 04 Nov 2024 14:49:29 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1730731652013/ca4df949-a670-4ddd-86d1-5a6441ac65a1.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Security Operation Centre (SOC)</strong></p>
<p>SOC is a team of cyber-security dedicated to monitoring and analysing an organization’s infrastructure 24/7 and the main responsibility of the SOC team is to respond to potential or current breaches. Also, the team is responsible for scanning the security systems in real-time.</p>
<ul>
<li><p>A good SOC operator is always looking to expand the company’s security visibility by maintaining an extensive inventory of all IT assets.</p>
</li>
<li><p>When a cyberattack occurs, the SOC acts as the digital front line, responding to the security incident with force while also minimizing the impact on business operations.</p>
</li>
</ul>
<p><strong>Cyber Security</strong></p>
<p>Cyber security is also called computer security and information technology security.</p>
<p>Cyber security is the protection of computer systems and networks from attacks by malicious attackers. This may result in unauthorized information disclosure, theft or damage of hardware, software, and data.</p>
<p>Cyber security is important because smartphones, computers and the internet are now such a fundamental part of modern life, that it's difficult to imagine how we'd function without them. This will lead to many digital attacks associated with them.</p>
<p><strong>Information Security</strong></p>
<p>Information security is also called InfoSec. It is not only about securing information from unauthorized access to the data.</p>
<p>Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information.</p>
<p>In short, information security is the practice of protecting information by mitigating information risks and it is a part of information risk management.</p>
<p><strong>Difference between cyber security and information security</strong></p>
<p>The terms Cyber security and information security are used interchangeably. As they both are responsible for the security and protection of the computer system from threats and information breaches.</p>
<p>Examples of Cyber security are:</p>
<ul>
<li><p>Network security</p>
</li>
<li><p>Application Security</p>
</li>
<li><p>Cloud Security</p>
</li>
<li><p>Critical infrastructure</p>
</li>
</ul>
<p>Examples of information security are:</p>
<ul>
<li><p>Procedural controls</p>
</li>
<li><p>Access controls</p>
</li>
<li><p>Technical controls</p>
</li>
<li><p>Compliance controls</p>
</li>
</ul>
]]></content:encoded></item></channel></rss>