fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Security Bug Hunters Focus On Misconfigured Services, Earn Big Rewards

Security Bug Hunters Focus On Misconfigured Services, Earn Big Rewards

An overview of the hacking activity on the HackerOne vulnerability coordination and bug bounty platform shows that misconfiguration of cloud resources is quickly becoming a hot target for ethical hackers.

This type of weakness is among the top threats in an organization as cybercriminals are quick to take advantage of faults in this category to carry their attacks.

A significant threat

In its report today, HackerOne reveals that last year, the number of misconfiguration reports submitted through the platform more than tripled.

This type of error did not make it into the top ten list of vulnerabilities but it recorded an increase of 310%, the highest by far when compared to all others.

source: HackerOne

Also Read: PDPA Compliance Singapore: 10 Areas To Work On

HackerOne says that the surge was caused by the pandemic, which led many organizations to shift to cloud resources to keep the business running with employees working from home.

“New technologies and methodologies mean there are usually misconfigurations along the way that lead to vulnerabilities,” says Shubham Shah, web app penetration tester and co-founder of Assetnote.

Cybercriminals have indeed capitalized on misconfiguration weaknesses, proof being all the data leaks offered for sale or shared freely on underground forums.

A threat actor known as ShinyHunters is constantly dumping databases with user records from dozens of companies offering online services [1234567]. Translated into numbers, the actor has already leaked tens of millions of records.

Most of the data consists of email addresses, names, passwords (typically hashed), IP addresses, and other personal information belonging to registered users.

Cybercriminals are not the only ones showing the risk of misconfigured resources. Tillie Kottmann, a developer and reverse engineer has collected and published source code, some of it proprietary, from tens of high-profile companies such as Microsoft, Intel, Nissan, Sonarqube, Adobe, Lenovo, AMD, Qualcomm, Motorola, or Disney [12345].

As Kottmann told BleepingComputer on more than one occasion, most of the repositories had been copied because of misconfigured resources (exposed on the public web, weak credentials) that allowed easy access.

Hacking for big money

In terms of bounties paid, HackerOne says that 2020 was the year when hackers earned $40 million from disclosing vulnerabilities to companies on the platform.

This figure contributed significantly to the HackerOne reaching the milestone of 100 million milestone paid to hackers on the platform.

However, some hackers were more prolific than others. Since 2019 when HackerOne had its first hacker millionaire, another eight hackers earned that amount and one of them passed the $2 million mark.

In two years, the community has grown to more one million registered hackers spread across the globe, most of them (82%) doing this job part time and more than half (55%) being under 25.

Also Read: What Does A Data Protection Officer Do? 5 Main Things

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us