Skip to main content

CND News and Blog

Scammers. Societies bottom-feeders.

Scamming is sadly a daily risk whilst navigating cyberspace. I wrote almost exactly 3 years ago in different post about a similar postal scam, masquerading as the Post Office asking for a small missed delivery fee (URL). Well this week it happened again to a family member who started to fall for it, fortunately they stopped but ...

0
  225 Hits
  0 Comments

Is Hacktivism a Threat?

In today's modern world, the risk of cyber threats have increased significantly. With 5.16 billion people globally using the internet, you can understand how the use of hacktivism has increased The question we are asking today, is hacktivism a threat and what is it's impact on everyday society? In today's blog, we will explore this question further...

0
  228 Hits
  0 Comments

What is a Hacktivist?

There is no doubt you have heard the word 'hacker' in recent years, but are you familiar with the word hacktivist and what this means? Today we are going to explore what is a hacktivist, what is their purpose, why they perform some of their acts and what the difference is between hackers and hacktivists.  What is a simple definition of hacktiv...

0
  579 Hits
  0 Comments
Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks

Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks

A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers and open-source software components like TinyXML and OpenNDS. Collectively tracked as Sierra:21, the issues expose over 86,000 devices across critical sectors like energy, healthcare, waste management, retail, emergency services, and vehicle tracking to cyber threats, according

0
  228 Hits
  0 Comments
Scaling Security Operations with Automation

Scaling Security Operations with Automation

In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats. However, limited resources often hinder security teams when combatting these threats, making it difficult to keep up with the growing number of security incidents and alerts. Implementing automation throughout security operations helps security teams alleviate these challenges by streamlining repetitive tasks, reducing the risk of human error, and allowing them to focus on higher-value initiatives.

While automation offers significant benefits, there is no foolproof method or process to guarantee success. Clear definitions, consistent implementation, and standardized processes are crucial for optimal results. Without guidelines, manual and time-consuming methods can undermine the effectiveness of automation.

This blog explores the challenges faced by security operations teams when implementing automation and the practical steps needed to build a strong foundation for successful implementation.

The Automation Challenge

Organizations often struggle with automation due to a lack of well-documented processes and limited resources. With constant alerts and fires to put out, security teams are often spread thin, and only have time to focus on the task in front of them. This leaves them little to no time for proper documentation of processes and procedures. This, along with other factors such as maturity and process monitorability, contributes to the challenges security teams face when implementing automation. Successful automation requires a pragmatic approach, where teams identify and prioritize processes that are feasible and provide the greatest impact on efficiency and risk reduction.

0
  303 Hits
  0 Comments

SANS Cyber Threat Conference London 2023

 Last week I was able to attend the CyberThreat 23 (CT23) conference in London, held by SANs and the National Cyber Security Centre (NCSC) The conference has been running for a few years now and from SANs marketing material the event is: Designed for security practitioners and spanning the full spectrum of offensive and defensive discipline, t...

0
  361 Hits
  0 Comments
IMG_00-_20231124-142135_1 Splunk: Building a Test Instance

Splunk: Building a Test Instance

TLDR: Building a Splunk Test instance is really useful, helps protect against prod outages and very performant hardware is now available for a fraction of the price it used to be; if you're willing to deal with some tech challenges! Splunk Test instance Many of our clients rely on Splunk as their production SIEM tool to monitor, detect and respond ...

0
  548 Hits
  0 Comments

Palo Alto Firewalls (End-of-Life) upgrade.

As my PA-220 firewall heads towards EoL I swapped it out for a PA-410 and OS 11.x I've worked professionally with firewall platforms for nearly 20 years, during that time I've configured Netscreen, Juniper, Palo Alto and Cisco to name a few of the dominant vendors. The most admin friendly and enjoyable platform to work with in m...

0
  751 Hits
  0 Comments

Review: NextDNS | Privacy, Security | Splunk App

I was listening to an InfoSec podcast on the drive back from a client recently (Privacy, Security & OSINT Show) it's a really good listen and I really appreciate Michael Bazzells work. One of the items in the podcast was NextDNS, a product which I've not come across before. NextDNS operates by you registering an account for a very mod...

0
  1447 Hits
  0 Comments

How To Spot The Flags in a Phishing Email

This simulated phishing email had two possible failure actions – clicking on the link or opening the PDF attachment. It was a particularly difficult scenario as it appeared to come from a real member of the CND team, however, there were a few indicators (red and amber flags) which could have been spotted. The reason we have labelled some of these a...

0
  544 Hits
  0 Comments
hacktivism_sml

What is a Hacktivist?

There is no doubt you have heard the word 'hacker' in recent years, but are you familiar with the word hacktivist and what this means? Today we are going to explore what is a hacktivist, what is their purpose, why they perform some of their acts and what the difference is between hackers and hacktivists. What is a simple definition of hacktivist? A...

0
  125 Hits
  0 Comments
IMG_0351 Splunk .conf 23

Splunk .conf 23

TLDR: Excellent technical conference with great opportunities for meeting other Splunkers, sound in-depth technical workshops with a good deal of content to follow up on and study. Splunk as a tech company manages an effortlessly relaxed corporate culture that is very enjoyable to be a part of. Intro: This was to be my first global scale tech confe...

2
  1033 Hits
  0 Comments

Identifying Plagiarism Using AI Bots Like ChatGPT

For several months we have been seeing a huge interest in the capabilities of ChatGPT and with a high school teacher in the family, we have looked a little deeper in detecting it's use. At Computer Network Defence Ltd (CND) we will often test the resourcefulness of our new cyber security candidates by asking them to research a topic and d...

1
  1296 Hits
  0 Comments

Spear Phishing - Cyber Attacks

 We have all heard of Phishing attacks, where emails are used as bait to lure us into clicking on a link or opening an attachment. However, because we are now much wiser to the threat, attackers are having to work harder to lure us in by doing some research. These targeted phishing attacks are referred to as Spear Phishing, and humorously, if ...

10
  1122 Hits
  0 Comments

Digital Isle 2022

Digital Isle has concluded for 2023, CND had a wonderful time. We would like to thank the organisers for putting on such a riveting event. The lectures were all very informative and gave insight into what businesses in IoM will be facing in the years to come! Our CTO, Jeff, was part of the Cyber Blind Spot panel, and it was an exciting chat with ot...

0
  792 Hits
  0 Comments

Digital Isle 2022

CND is excited to announce that we will be at Digital Isle on 10th November. Digital Isle was created to support the tech sector, developing and implementing a strategy to support sustainable economic growth and establishing the Island as a centre of international excellence for the digital economy. Our very own CTO, Jeff, will be providing a lectu...

1
  836 Hits
  0 Comments
The-Techies-Finalist-Log_20221005-160630_1

CND have been shortlisted for the Techies' "Tech Team of the Year" award!

CND are delighted to announce that we have been shortlisted for the Techie's Awards' "Tech Team of the Year 2022" award. The Techies award scheme, which is now in its fifth year, celebrate the amazing tech innovation happening in the Swindon and Wiltshire commununity, and is designed to be inclusive with categories recognising organisations, projec...

0
  1096 Hits
  0 Comments

CND Code Club Sponsors

CND are proud sponsors of the Isle of Man Code Club Teams that headed to the CyberCenturion National Finals this year! IoM Code Club sent two teams into the top 15 spots in the competition; they scored some of the best scores out of 400 teams. The teams, CyberAces and The Toast Mine of Cookies, competed in the U.K. in April. CyberCenturion is a Cyb...

2
  2321 Hits
  0 Comments

New Vulnerabilities Monday 14 March

New Alerts for McAfee and Apache. SecurityWizardry.com - Vulnerability Details Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries. https://www.securitywizardry.com/index.php/the-radar-page/alert-details#alerts Security Wizardry Cyber Threat Intelligence - The Radar Page https://radar....

2
  2740 Hits
  0 Comments

New Vulnerabilities Friday 04 March

New Alerts for IPCOMM, VMware, Microsoft Edge, IBM, Hitachi, SolarWinds, and Linux. SecurityWizardry.com - Vulnerability Details Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries. https://www.securitywizardry.com/index.php/the-radar-page/alert-details#alerts Security Wizardry Cyber T...

2
  2879 Hits
  0 Comments

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/