Video: Four SIEM case studies

One video: Four SIEM use-cases in eight minutes! Security Information and Event Management (SIEM) solutions are often seen as complex and expensive. However, their true value lies in mitigating financial, compliance, and third-party risks through early detection and automation.  This video walks us through four SIEM case studies that show how SIEM can strengthens security […]

Becoming one with the malware

DLL sideloading: tricks, traps and fixes – Part 1! This blog post is a result of our investigation into the process that attackers use when sideloading malicious DLLs into .NET executables. We’ll describe how and under what circumstances an attacker can get a malicious .NET DLL to be loaded by a trusted (signed) .NET executable, […]

ASIC and drinking horses

Leading a horse to water We’ve all heard the saying: “You can lead a horse to water but you can’t make it drink”, right?  Well, the Australian Securities and Investments Commission (ASIC) seems to have different ideas! ASIC has commenced a law suit in the Federal Court of Australia. ASIC alleges [that] from March 2019 to […]

Actual posts from #therealMSIEM

Actual posts from #therealMSIEM Security Information and Event Management (SIEM) solutions are often seen as complex and expensive. However, their true value lies in mitigating financial, compliance, and third-party risks through early detection and automation. This article examines practical use cases that demonstrate how SIEM strengthens security operations and prevents costly incidents. We refer to […]

The human factor: How to undermine your PCI DSS compliance

How to undermine your PCI DSS compliance efforts When it comes to PCI DSS compliance, most organisations focus on technical controls such as firewalls, encryption, and monitoring tools, to secure cardholder data. However, even the most advanced technical safeguards can be rendered useless if employees mishandle cardholder data due to a lack of training. PCI […]

Cyber: What HR and recruiters need to know.

Hiring from North Korea? HR, recruiters and cyber security In May 2024, the U.S. Department of Justice unsealed charges against individuals involved in schemes where overseas IT workers, some linked to North Korea, posed as U.S. citizens to secure remote employment with over 300 American companies. These workers utilized stolen or borrowed identities to gain employment with […]

Internet shortcuts and DLL hijacking

Internet shortcuts and DLL highjacking TL; DR DLL hijacking over WebDAV using .url files is still effective now, in 2024. Windows hardening measures don’t help if you use MSBuild .rsp files  But there are videos, so you really should read on! Introduction Internet shortcut (.url) files are traditionally used to link to an (Internet-based) URL […]

CASE STUDY: MEASURABLE GAINS

CASE STUDY: MEASURABLE GAINS Cross-business testing and improvement program Background and Challenges Our client is responsible for the administration of multiple businesses, and they engaged dotSec to address a very interesting and critical cybersecurity challenge:  Each business had previously functioned as an independent business unit, and over time, this had resulted in varied levels of […]

Walking the ISO 27001 walk

dotSec achieves ISO 27001 certification dotSec is thrilled to announce a recent milestone: Achievement of ISO/IEC 27001:2022 certification!  This achievement represents a significant step forward in our ongoing commitment to excellence in information security management. ISO 27001 is a globally recognized standard that outlines the best practices for establishing, implementing, maintaining, and continually improving an Information […]

dotSec news – August 2024

News and updates – August 2024 In this newsletter: Recent dotSec certification achievements and training news. Read about a recent dotSec GRC project that focused on ISO/IEC 27001:2022 preparation. Meet Gautham, Head of Governance, Risk and Compliance (GRC) at dotSec and learn more about dotSec’s GRC services. Cyber security expertise through training The dotSec ethos […]