WEBINAR | From Deal to Defense: Unifying Cybersecurity Post-M&A
Reduce Alert Noise and False Positives
Boost your team's productivity by cutting down alert noise and false positives.
Automate Security Operations
Boost efficiency, reduce burnout, and better manage risk through automation.
Dark Web Monitoring
Online protection tuned to the need of your business.
Maximize Existing Security Investments
Improve efficiencies from existing investments in security tools.
Move your security operations beyond the limitations of MDR.
Secure with Microsoft 365 E5
Boost the power of Microsoft 365 E5 security.
Secure Multi-Cloud Environments
Improve cloud security and overcome complexity across multi-cloud environments.
Secure Mergers and Acquisitions
Control cyber risk for business acquisitions and dispersed business units.
Solve security operations challenges affecting critical operational technology (OT) infrastructure.
Force-Multiply Your Security Operations
Whether you’re just starting your security journey, need to up your game, or you’re not happy with an existing service, we can help you to achieve your security goals.
Detection Investigation Response
Modernize Detection, Investigation, Response with a Security Operations Platform.
Locate and eliminate lurking threats with ReliaQuest GreyMatter
Find cyber threats that have evaded your defenses.
Security metrics to manage and improve security operations.
Breach and Attack Simulation
GreyMatter Verify is ReliaQuest’s automated breach and attack simulation capability.
Digital Risk Protection
Continuous monitoring of open, deep, and dark web sources to identify threats.
GreyMatter Phishing Analyzer removes the abuse mailbox management by automating the DIR process for you.
The GreyMatter cloud-native Open XDR platform integrates with a fast-growing number of market-leading technologies.
Unify and Optimize Your Security Operations
ReliaQuest GreyMatter is a security operations platform built on an open XDR architecture and designed to help security teams increase visibility, reduce complexity, and manage risk across their security tools, including on-premises, clouds, networks, and endpoints.
Brands of the world trust ReliaQuest to achieve their security goals.
Learn how to achieve your security outcomes faster with ReliaQuest GreyMatter.
The latest security trends and perspectives to help inform your security operations.
Industry Guides and Reports
The latest security research and industry reports.
Catch up on the latest cybersecurity podcasts, and mindset moments from our very own mental performance coaches.
A deep dive on how ReliaQuest GreyMatter addresses security challenges.
The latest white papers focused on security operations strategy, technology & insight.
Current and future SOC trends presented by our security experts.
Events & Webinars
Explore all upcoming company events, in-person and on-demand webinars
From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security posture.
Get the latest threat analysis from the ReliaQuest Threat Research Team. ReliaQuest ShadowTalk Weekly podcast featuring discussions on the latest cybersecurity news and threat research.
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories.
February 20, 2024
We bring our best attitude, energy and effort to everything we do, every day, to make security possible.
Security is a team sport.
No Show Dogs Podcast
Mental Performance Coaches Derin McMains and Dr. Nicole Detling interview world-class performers across multiple industries.
Make It Possible
Make It Possible reflects our focus on bringing cybersecurity awareness to our communities and enabling the next generation of cybersecurity professionals.
Join our world-class team.
Press and Media Coverage
ReliaQuest newsroom covering the latest press release and media coverage.
Become a Channel Partner
When you partner with ReliaQuest, you help deliver world-class cybersecurity solutions.
How can we help you?
A Mindset Like No Other in the Industry
Many companies tout their cultures; at ReliaQuest, we share a mindset. We focus on four values every day to make security possible: being accountable, helpful, adaptable, and focused. These values drive development of our platform, relationships with our customers and partners, and further the ReliaQuest promise of security confidence across our customers and our own teams.
There is a saying derived from Western movies that say whoever draws first, loses the duel. Nick Bohr, a famous physicist, once said that it takes more time to initiate a movement than to react to one. People are very reactive by nature. In vulnerability management, there is a lot of pressure to quickly react when critical vulnerabilities make headlines. However, if you don’t take the time to properly investigate and prioritize vulnerabilities that are important for your environment, you could find yourself on the losing end of a duel with a cyber-criminal.
Digital Shadows (now ReliaQuest)’ new Vulnerability Intelligence capability can help provide context to CVEs in one, centralized location; the SearchLight portal. There is no longer a need to scour the web for as much information as possible. If you haven’t already, check out our Q1 2022 Vulnerability Roundup blog which provides a detailed overview of CVE trends from Q1.
For this month’s vulnerability intelligence blog, I am going to discuss two critical CVEs that are being actively exploited by threat actors, as well as a recent risky update.
On 04 May 2022, F5 released a security advisory to address a remote code execution (RCE) vulnerability in the Big-IP iControl REST. The iControl REST is essentially a web-based interface or portal where administrators can manage and configure Big-IP devices, such as network gateways and firewalls. The vulnerability, tracked as CVE-2022-1388, can allow an attacker to bypass authentication and execute code on unpatched systems.
It only took a few short days before security researchers began sharing proof of concepts capable of exploiting the vulnerability. To make matters worse, one security researcher identified that attackers do not need a password to exploit the vulnerability. As long as the username “admin” or “root” is used, any password will work, even no password at all. This left the security community on Twitter wondering how F5 could have let this happen.
By 09 May 2022, there was evidence the vulnerability was being actively exploited in the threat landscape. F5 has released Big-IP security updates that address this critical vulnerability and organizations are encouraged to patch impacted devices as soon as possible.
On 12 May 2022, Zyxel released a security advisory for a critical command injection vulnerability in the common gateway interface (CGI) program software of some firewall versions. Tracked as CVE-2022-30525, the vulnerability can allow an attacker to modify specific files and then execute commands on a vulnerable device.
Within 24 hours of this disclosure, a proof of concept was created and there were already exploitation attempts observed in the wild. Firewalls act as the first line of defense against cyber threats, much like a large wall around a castle. Once the wall is compromised, the damage could be catastrophic. Patching this vulnerability should be a high priority for organizations due to the potential impact of exploitation.
There are over 20,000 devices potentially vulnerable to a critical vulnerability. The Director of Cybersecurity at the National Security Agency (NSA) published a tweet on 15 May 2022 urging administrators to patch impacted devices.
On the second Tuesday of every month, Microsoft releases security fixes, or general updates, for their software, including Windows operating system (OS). This regular schedule makes it easier for administrators during their patch management process.
After May’s Patch Tuesday on 10 May 2022, there were multiple reports of authentication errors from admins who had installed the patches on their domain controllers. Admins were getting errors stating that either their usernames didn’t exist or the passwords were incorrect. Microsoft identified there was an issue with the mapping of certificates to user accounts and recommends administrators manually map certificates until additional fixes are released.
So what happens when the patch intended to fix one thing breaks something else? Unfortunately, this happens quite a bit for administrators. Security updates do not always get along with other software in the environment, especially legacy systems. This is where patch testing comes in.
Imagine this. You want to get a new puppy, but you are not sure how your existing dog will react. Will they get along or will it just not work? The best practice is not to just release the hounds and hope nothing goes wrong. It is recommended to take both dogs to a neutral place, such as a park, and make the introduction slowly in a controlled environment.
Patch management is very similar. Ideally, you will want to test a patch out before pushing it into production. Disrupting business operations can lead to a loss in revenue and often an increase in expenses, such as overtime labor to fix the issues.
So, what do you do when there is not enough time for proper patch testing, such as when critical vulnerabilities are being actively exploited? Perform an investigation to determine the potential impact, if there is an exploit available, and the overall risk to your environment. Sometimes, there are complex critical vulnerabilities that we never see exploits for.
After you have prioritized the vulnerabilities, your investigation may reveal you have more time than you originally thought to test patches. However, as we saw with the Zyxel and Big-IP vulnerabilities, there may always be times when IT teams are racing against the clock to patch due to the ease of exploitability.
Vulnerability Intelligence can help organizations make informed, risk-based decisions during the vulnerability management process. SearchLight’s Vulnerability Intelligence capability provides actionable insights and contextual information promptly. Digital Shadows (now ReliaQuest) has a dedicated team of vulnerability intelligence analysts that combine automated collection with their own continuous monitoring and analysis.
Curious to know more about how SearchLight (now ReliaQuest’s GreyMatter Digital Risk Protection) can help? Schedule a demo to see our Vulnerability Intelligence in action!
Not ready to talk? Check out our Vulnerability Intelligence Solutions Guide instead.