POSTS
A Look into Application Security Assessment Techniques
A Look into Application Security Assessment Techniques In software development, application security assessments are a key part of ensuring a robust cybersecurity program in your organization. Your application is constantly changing throughout its lifecycle and each one of those changes has the potential to introduce a critical vulnerability. Application security assessments and testing are vital…
Read MoreStatic Application Security Testing (SAST)
In the ever-evolving landscape of software development, security remains a paramount concern. At VDA Labs, we emphasize the importance of proactive security measures, and Static Application Security Testing (SAST) stands out as a pivotal tool in our arsenal. SAST offers a powerful way to scrutinize program code for potential vulnerabilities, ensuring that your software is…
Read MoreBusiness Logic Assessments
Business Logic Assessments (BLA) VDA Labs can assist you in enhancing your application security through a variety of means. Why? Firstly, it’s crucial to acknowledge the expanding digital realm, where web applications are essential for accessing valuable customer data and financial transactions. This space is constantly targeted by cybercriminals exploiting vulnerabilities within these applications, making…
Read MoreThe Critical Citrix NetScaler Vulnerability -CVE-2023-4966
Introduction A significant cybersecurity event has unfolded with the discovery and exploitation of a critical vulnerability in Citrix NetScaler ADC/Gateway devices. This vulnerability tracked as CVE-2023-4966, has been actively exploited since late August 2023, raising alarms across the cybersecurity community. Understanding CVE-2023-4966 CVE-2023-4966 is an information disclosure vulnerability that allows attackers to access secrets…
Read MoreCrowdStrike and Abnormal
Introduction The cybersecurity domain is witnessing a formidable alliance that redefines its landscape. CrowdStrike, a leader in cloud-based security, has joined forces with Abnormal Security through its CrowdStrike Falcon Fund investment. This collaboration is now further empowered with the involvement of VDA Labs. The Trio’s Collaborative Strength This three-way partnership converges CrowdStrike’s advanced endpoint…
Read MoreMSSP Services for your Organization?
Overview In today’s digital age, businesses face increasing threats from cyberattacks, data breaches, and other security risks. These threats can cause financial losses, reputational damage, and legal liabilities. To protect against these risks, many organizations turn to managed security service providers (MSSPs) to manage their security needs. In this blog post, we’ll explore the benefits…
Read MoreHow SIEM Helps Safeguard Your Business
VDA Vigilance SIEM Solution stands at the forefront of cybersecurity, offering unparalleled services in monitoring, detecting, and neutralizing cyber threats, thereby ensuring they do not adversely impact your business operations. At the core of our offerings is our proprietary software, a sophisticated blend of advanced security software, and the vigilant oversight of our expert security…
Read More4 Security Breaches SIEM Can Help Mitigate
4 Security Breaches SIEM Can Help Mitigate. A security breach can be a costly and damaging event for any organization. While there is no foolproof way to prevent all breaches, using a Security Information and Event Management (SIEM) solution can help organizations detect and respond to security incidents more quickly and effectively. SIEM solutions are…
Read More4 Benefits of SIEM Software
Here at VDA Labs, we are your security partner, and our goal is to make the world a better place by securing software systems, and enterprises, and conducting cutting-edge cyber missions. One of our primary services is our security information and event management (SIEM) software, and businesses rely on our software to protect their data…
Read MoreWhat Is SIEM Software and How Does It Work?
What Is SIEM Software and How Does It Work? When it comes to information security, one of the most important things an organization can do is to have a system in place that collects, processes, and analyzes security-related data. This system is called security information and event management (SIEM), and in today’s blog post, we’re…
Read MoreCitrix ADC (Netscaler ADC) Multi-Factor Bypass
While working with a client, VDA engineers encountered an interesting circumstance that allowed for the bypassing of Multi-factor Authentication for users who had already set this up on their accounts. This particular misconfiguration/vulnerability was possible due to the way Citrix ADC (formerly NetScaler ADC) handles user authentication. How does it work? Upon initial login attempts…
Read MoreAutomating GHIDRA: Writing a Script to Find Banned Functions
At VDA Labs we get excited about Reverse Engineering tools, and the release of NSA’s GHIDRA was valuable to the industry. The fact that it is free, supports many different CPU architectures, contains decompiler functionality, and allows many Reverse Engineers to work on the same project via a Team server, are some of the highlights. Another…
Read More