Swimlane introduces an OT security automation ecosystem

The launch of a security automation solution ecosystem for operational technology (OT) environments was announced on Monday by Swimlane, a provider of security orchestration, automation, and response (SOAR). For this OT security automation ecosystem, the business has partnered with a number of organizations, including the industrial cybersecurity firm Nozomi, the event monitoring and risk detection […]

Glue – Application Security Automation

Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools. Dependencies clamav hashdeep rm (*nix) git mount (*nix) docker Download & Install gem install owasp-glue ordocker run owasp/glue Installation & run for Development purpose git clone https://github.com/owasp/glue cd glue — […]

How Can Automation, AI, and ML Improve Cybersecurity?

When it comes to strengthening the current cybersecurity practices employed in organizations today, one of the most significant steps that security teams can take is to amalgamate modern technologies into an enterprise’s cybersecurity infrastructure. Typically, organizations tend to rely on technologies such as artificial intelligence and machine learning – both of which have taken the […]

WinPwn – Automation For Internal Windows Penetrationtest / AD-Security

In many past internal penetration tests I often had problems with the existing Powershell Recon / Exploitation scripts due to missing proxy support. I often ran the same scripts one after the other to get information about the current system and/or the domain. To automate as many internal penetrationtest processes (reconnaissance as well as exploitation) […]

Leveraging Automation to Boost Your Cybersecurity

The growing variety and sophistication of cybersecurity threats have outpaced the development of conventional security tools. Apart from commoditized and automated hacking methods such as viruses, file-based malware, and botnets, advanced persistent threats (APTs) have also risen to become threats to anyone’s security. APTs are persistent malicious actors that attempt to gain access to infrastructure […]

Laforge – Security Competition Infrastructure Automation Framework

Laforge enables rapid development of infrastructure for the purpose of information security competitions. Using a simple and intuitive configuration language, Laforge manages a dependency graph and state management and allows for highly productive remote collaboration. The Laforge engine uses a custom loader to do multi-dimensional, non-destructive configuration overlay. A good analogy to this is Docker […]

New security processes to prevent malicious automation on Twitter

Pentest specialists argue that social platforms can be a tool used for psychological warfare operations (PSYOPS) and malicious web campaigns, which is why Twitter has implemented new security features to identify and stop these abuses. Malicious agents set up bots to spread advertisements and links to dubious content websites, and social media platforms are dedicating significant efforts […]