The Case Study: The Exploitation of Business Assets

The role of this case study is to explain how it's feasible to exploit some business assets using the IoT search engines and some hacking tools.
In this chapter, we would apply the Censys searching tool for crawling the web in a quite wide context, so the users of this book should simply follow the given instructions.
It's quite clear that such an asset could get included into a critical infrastructure for a reason - in case of its collapse many people would stay without many things meaning a lot to them.
We could try to deal with some trading organizations, but to be honest - we would get no information about their vitally significant web servers using the Censys as our searching tool.
Next - in a Figure 1 - we would show a typical business illustration being accessible through the web.
The first thing we would do in this case would be searching the web using a standard Google crawler.
Through our research - we would think deeply about the differences between the Google and Censys crawlers and we would come to a conclusion that Google would offer us the web content being visible to a browser, while Censys would go deeper and offer us infrastructure that would include the web servers, devices being connected to the internet and much more.
On the other hand, the Google got suitable for quite surface searches offering as the results which got some sort of the web interface such as websites, webpages and web presentations.
The Censys is so serious product giving us the IP addresses of devices being the part of the web.
Sometimes it's possible to get some webpage as a result of the Censys search, but in that case - you should get aware that such a result must be correlated with some of the IoT assets.
As it's illustrated in a Figure 2 - we would get the web link to a PTT Service.
The fact is that in such a case - we would get the IP addresses of some PTT Net's web servers.
As it's shown through the Figure 4 - we would select some of the results leading us to some of the PTT Net's web servers.
It's quite obvious that this detailed representation would provide us more information what such web server is about.
We would get more details about its physical location as well as web server's administration.
Let us remind you - that would happen when we tried to explain how it's easy to hack those thousand web assets being available through the Shodan's crawler.
Many web resources would offer a quite convenient explanation how hacking of any IT infrastructure works in practice.
We would warmly advise all people spending a lot of time on the web on a daily basis to try to think hard and figure out how these emerging technologies could get applied in protecting our assets and preventing any sort of a cybercrime.
The main thing that we would notice through this research is that it's quite easy to threaten all - mechatronics and embedded systems as well as business assets.
Through these case studies - we would see how it works in practice and how vulnerable our IT assets are.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Thu, 28 Dec 2023 06:13:05 +0000


Cyber News related to The Case Study: The Exploitation of Business Assets

The Case Study: The Exploitation of Business Assets - The role of this case study is to explain how it's feasible to exploit some business assets using the IoT search engines and some hacking tools. In this chapter, we would apply the Censys searching tool for crawling the web in a quite wide context, ...
10 months ago Cyberdefensemagazine.com
SaaS Asset and User Numbers are Exploding: Is SaaS Data Security Keeping Up? - DoControl's recently released The State of SaaS Data Security 2024 report revealed a striking picture of ballooning SaaS asset and user numbers alongside security gaps that open the door to exploitation. The report, based on data from DoControl's ...
7 months ago Cybersecurity-insiders.com
Understanding MAS Asset Risks in Healthcare Environments - Medical Assets Security (MAS) is an important topic to consider when protecting patient data within a healthcare environment. Mobile applications are often utilized in healthcare settings, with hundreds of varying applications available to users. ...
1 year ago Securityaffairs.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
9 months ago Securityzap.com
Sensitive data loss is due to lack of encryption - In an era where data is the lifeblood of businesses, safeguarding sensitive information has become paramount. Cybersecurity lapses have historically been a cause of data breaches, but a recent study sheds light on a new dimension of vulnerability - ...
11 months ago Cybersecurity-insiders.com
NFT Company Obtains Restraining Order to Freeze Hacker's Online Wallet - A British investment company, NFT Investments, announced Tuesday that it had obtained a restraining order against an online wallet holding assets a hacker stole from it earlier this year. NFT Investments, which works with small companies developing ...
1 year ago Therecord.media
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
Criminal IP and Tenable Partner for Swift Vulnerability Detection - Criminal IP, a prominent Cyber Threat Intelligence search engine developed by AI SPERA, has recently established a technical partnership with Tenable, a global leader in exposure management. This partnership is designed to equip users with a robust ...
10 months ago Bleepingcomputer.com
Want to Justify Your IT Investments Faster? Measure Business Outcomes. - Achieving strategic business outcomes in today's fast-paced digital climate is a key imperative. Digital transformation, better customer experiences, increased productivity, and cost savings are rated as the most important business outcomes, ...
10 months ago Feedpress.me
Security Boulevard - Veriti proactively monitors and safely remediates risk across the security infrastructure to elevate CNAPP by remediating compensating controls, without disrupting the business. EXECUTIVE SUMMARY. The Veriti and Wiz integration transforms cloud ...
6 months ago Securityboulevard.com
Security Boulevard - Veriti proactively monitors and safely remediates risk across the security infrastructure to elevate CNAPP by remediating compensating controls, without disrupting the business. EXECUTIVE SUMMARY. The Veriti and Prisma Cloud integration transforms ...
6 months ago Securityboulevard.com
Navigating Retail Disruption: Maximize Customer Centricity and Business Performance with Observability - Cisco Full-Stack Observability solutions help optimize and secure the applications that underpinonline and in-store experiences from the customer to the warehouse to economies of scale. Retailers can become more customer centric by taking action that ...
11 months ago Feedpress.me
Top Guns: Defending Corporate Clouds from Malicious Mavericks - Securing the slow but inevitable transition from traditional network and application infrastructures to the Cloud has long been a point of emphasis. The COVID fueled acceleration of Cloud-first infrastructures, combined with tectonic shifts in the ...
11 months ago Securityweek.com
Creating a formula for effective vulnerability prioritization - In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. Gorelik discusses challenges posed by regulatory frameworks, incomplete asset ...
11 months ago Helpnetsecurity.com
Every "Thing" Everywhere All at Once - Then you have to take into account the physical and virtual assets comprising a typical environment, many of which come and go, connect and disconnect independent of IT management. In a 2022 study commissioned by IBM, technology analyst firm IDC ...
11 months ago Securityweek.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Research Shows 163% ROI with Palo Alto Networks Software Firewalls - Good news is here for cloud and network security professionals who need proven, cost-effective solutions that substantially reduce downtime and breaches across a range of cloud and virtualized environments. Palo Alto Networks software firewalls not ...
11 months ago Paloaltonetworks.com
Meet the new CloudGuard: Risk Management in Action - Security teams need to plan the measures taken to reduce the harmful effects of a CVE, to ensure that the applications they are managing remain secure while business availability is not affected, and developers can continue with their day-to-day ...
11 months ago Blog.checkpoint.com
Full-stack application and data security with business risk observability - Cisco Full-Stack Observability brings application observability together with security intelligence and risk assessment for comprehensive business-focused oversight. Businesses in all sectors and industries report feeling more exposed to security ...
7 months ago Feedpress.me
Behind Closed Doors: The Dangers of Relying on In-House Platforms for Business Success - Setting the right strategy for a company is indeed only half the battle against the competition in today's volatile digital world. The majority of business processes in companies evolve organically and slowly over time, and this in turn easily ...
11 months ago Cysecurity.news
CVE-2024-21682 - This High severity Injection vulnerability was introduced in Assets Discovery 1.0 - 6.2.0 (all versions). ...
9 months ago
CVE-2024-26152 - ### Summary ...
8 months ago
What Is Security Service Edge: All You Need to Know - Security service edge is a security technology that secures access to assets outside of the corporate network. Security service edge introduces a control that connects to remote users and assets before they connect to each other. All SSE tools borrow ...
5 months ago Esecurityplanet.com
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business - Cyber security is no longer just about keeping systems and devices safe, it's also become central in enabling business to achieve their strategic objectives. Paul Brucciani, Cyber Security Advisor at WithSecureâ„¢, has important information about ...
9 months ago Cyberdefensemagazine.com
New Report: 85% Firms Face Cyber Incidents, 11% From Shadow IT - Over the past two years, 85% of companies globally have experienced cyber incidents, with 11% attributed to the unauthorized use of shadow IT. The figures originate from a recent study conducted by cybersecurity company Kaspersky, exposing a ...
11 months ago Infosecurity-magazine.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)