our weblog
Latest update from our blog post
Cyber-Incident do’s and don’ts
As a Cyber-Incident Response provider, we at CERTAINITY have to deal with Ransomware- and other cyberattacks that do have devastating effects on the affected organization. In this blog post, we outline the most important do’s and don’ts when dealing with Cyber-Incidents. Cyber incident response refers to the actions taken by an organization to manage and contain the impact of a cyberattack or data breach. Effective cyber incident response is crucial to minimizing the damage caused by a cyber incident and restoring normal operations as quickly as possible.
Weiterlesen...Security Advisory: Unauthenticated Configuration Export in Multiple WAGO Products
As shown in our previous security advisory for the Asus M25 NAS from our research cooperation with ONEKEY, we recently introduced a “zero-day identification” module that performs static code analysis on proprietary applications found within firmware uploaded to ONEKEY’s platform.
This module reported two potential issues within a WAGO Series PFC100 configuration API: a path traversal and a command injection vulnerability. The command injection turned out to be a false positive (we strengthened our analysis capabilities since then) but it got us to investigate a specific PHP file where we identified that the authentication and authorization code blocks were commented.
Weiterlesen...The European Cyber Resilience Act – Silver bullet to sustainably increase cyber security or deservedly dreaded regulation to hinder digital product innovation?
The final proposal of the European Cyber Resilience Act is publicly available since September 2022 and so are the results of the EU's impact assessment of the planned regulation. While the overall need for the European Cyber Resilience Act or a similarly targeted regulation is out of question so is the fact that it will impact enterprises throughout Europe in the market of digital product development and sales.
In this article we will offer a high-level analysis of the regulation itself, provide some clarification regarding its scope and the potential impact as well as immediate remediation steps enterprises can take to address the requirements. This article will mostly focus on issues relevant for digital product developers and manufacturers.
Weiterlesen...Security Advisory: Asus M25 NAS Vulnerability
ONEKEY and CERTAINITY - together for more cybersecurity
In October we announced our joint research cooperation, and we are able to present you our first findings.
We recently deployed the first component of our “zero-day identification” module, which aimed at identifying vulnerability patterns in scripting languages. It’s been a long time coming and we want to share a few technical details about it with you.
Our objective is to support identification of vulnerability patterns in both scripting languages and compiled binaries. We started off with scripting languages as it seemed to be the easiest path to get results fast. Our first order of business was to identify the distribution of scripting languages within our corpus based off our file categorization. These statistics guided us in choosing which languages to support first.
Weiterlesen...Michael Brunner certified as SABSA Chartered Security Architect (SCF)
CERTAINITY offers all employees ample opportunities for professional and personal growth – during interesting customer projects and via dedicated trainings.
Michael Brunner decided to take this offer to expand his already profound security architecture knowledge and attended the SABSA foundation courses in October 2022. SABSA is a proven methodology for developing business-driven, risk and opportunity focused Security Architectures at both enterprise and solutions level that traceably support business objectives. Thereby, it is ensured that security services are designed, delivered, and supported as an integral part of IT management infrastructure and in accordance with business needs.
Weiterlesen...ONEKEY and CERTAINITY - together for more cybersecurity
ONEKEY - one of the leading European specialists for automated IoT/OT security & compliance analyzes and CERTAINITY GmbH - the European cybersecurity consultant, will conduct joint research activities in the cybersecurity environment in the future. The focus will be on networked, intelligent devices and industrial controls and the results will be published on a regular basis.
Digitalization offers extraordinary opportunities for the economy and society. Nevertheless this also create considerable risks of espionage, manipulation and endangerment of privacy. Cyberattacks are becoming smarter; the threat in this respect has increased steadily in Europe in recent years. The research cooperation between ONEKEY and CERTAINITY will focus on the various security risks of networked, intelligent devices and industrial controls in the coming months. Their selection is carried out by ONEKEY and takes place in accordance with their Disclosure Policy.
Weiterlesen...