The power of purple 💜 Have you heard of purple teaming? This short video explains purple teaming, what it is, and how working collaboratively with red and blue teams can improve your security posture in real-time. Our Head of Adversarial Simulation Max Corbridge explains 👇
JUMPSEC
Computer and Network Security
Acton, London 2,525 followers
Futureproof your cyber defences, realise genuine improvement with JUMPSEC managed services and consultancy solutions.
About us
Futureproof your cyber defences and realise genuine improvement over time with JUMPSEC managed services and consultancy solutions. Our mission is to change the way the organisations deal with security and enable organisations to use the security they have invested in to the fullest. Incrementally improving organisations cyber security protection year on year. This means leaving generic behind by focusing on the specific threats you face, and outcomes you need to be secure. We specialise in solving unique challenges by applying our broad cyber security capabilities to design and deliver custom projects and innovative solutions, realising positive outcomes for our clients.
- Website
-
http://www.jumpsec.com
External link for JUMPSEC
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Acton, London
- Type
- Privately Held
- Founded
- 2012
- Specialties
- Cyber Incident Response, Security Architecture Consultancy, Application and Mobile penetration testing, Social Engineering, Security Assessments, Managed Vulnerability Scanning, Managed Monitoring, Security Operations Centre, SOC-as-a-service, Threat Intelligence, Security awareness workshops & training, Threat Modelling, Cyber Incident Response capability review, Incident detection and capability review, Cyber Security Consultancy, ransomware, Cyber Security, Penetration Testing, and managed services
Locations
-
Primary
33 - 34 Westpoint
Warple Way
Acton, London W3 0RG, GB
Employees at JUMPSEC
-
Somesh Mitra
Growth Champion. I am passionate about helping companies grow by addressing the structural issues that hold them back: strategic options, product…
-
Sam T.
CEO & Founder JUMPSEC
-
Bjoern Paul Richard Schwabe
Head of Continuous Attack Surface Management, CTO
-
Matt Norris
Cyber Security - COO
Updates
-
Harry Senior discusses our Detection and Response Team's journey with Microsoft Sentinel. Taking this approach, we've optimised costs, prioritised data sources, and tailored detections to client risks. Learn how our MDR service evolved to deliver more value through continuous improvement. Watch here ⬇️
-
Introducing CASM 👾 Continuous Attack Surface Management (CASM) continuously tracks and monitors your organisation's weak points, allowing you to mitigate risks before cyber attackers can exploit them. With CASM, you'll know who is targeting your business, why, and how. You'll always be prepared. Find out more on our new dedicated microsite: https://casm.jumpsec.com/ #cybersecurity #CASM #AttackSurfaceManagement
-
JUMPSEC reposted this
👇
So not only are attackers shifting from email to Teams/Slack/IM phishing instead, but it seems BlackBasta ransomware operators are deliberately email spamming their targets to set up a social engineering pretext for their initial Teams contact too — clever! I’ve written in detail about different phishing techniques possible using Slack and Teams before (links below), but let’s quickly summarize why attackers are shifting towards IM platforms over email: 1. Instant messengers are….instant. It’s very easy to quickly build rapport and trust before delivering the eventual phish. Email is comparatively slow and usually the actual phish is the first message. Building rapport first leads to increased success. 2. IM phishing avoids corporate email security practices. We’ve spent decades focusing on email security problems. Links are auto-analyzed and restrictive, users are trained to be suspicious, IR teams can search for known-malicious domains during incidents. Why not just avoid all that by going via instant messenger platforms? 3. The blending of personal and corporate communications has increased the attack surface. It’s common now for users to access their personal LinkedIn and (potentially work-related) Slack and Discord communities from their corporate laptops, where corporate IT has no visibility. 4. More sophisticated phishing techniques can be conducted using the rich functionality afforded by platforms like Teams and Slack compared with email. Check out my linked articles for more information, but some of the spoofing abilities are really sneaky! 5. Teams and Slack introduced external communications. IM platforms didn’t start out this way, so they were originally only a vector for internal phishing for insiders and lateral movement. Slack connect and Teams external access made external attacks possible 6. Red team success has shown that it just works. Max C. recently posted showing targets were 3x more likely to click malicious links, 2x more likely to submit credentials and half as likely to report when phishing was delivered over Teams compared with email. I think we’ll be seeing a lot more IM phishing in future! BlackBasta Teams phishing - https://lnkd.in/eNadzyw5 Slack phishing for initial access - https://lnkd.in/eyZuZ6MX Slack phishing for persistence - https://lnkd.in/ebY7tY2r Teams phishing for initial access - https://lnkd.in/eEidgbnN
-
It is great to hear more from our incident responders in this week's blog post about Malicious Template Injection, a technique used by LockBit this year. Hear more about this technique and how to detect it from Max Clarke! Check it out: https://lnkd.in/ewHkw93h
Weaponize Your Word - Malicious Template Injection | JUMPSEC LABS
labs.jumpsec.com
-
More great technical content from our Labs team! This week, DLL Hijacking 👇 https://lnkd.in/eqq_C3J3
Breaking into Libraries - DLL Hijacking | JUMPSEC LABS
labs.jumpsec.com
-
Recently, our team had the pleasure of reconnecting with our local community during a visit to Dairy Meadow Primary School, where we discussed internet safety and cyber security. We shared our approach to keeping safe online and explained how we assist our clients, providing the students with a solid foundation in cybersecurity. It’s been a year since our first visit to Dairy Meadow, and it was encouraging to see how much more aware the students have become, from our first talk and thanks in part to resources from National Cyber Security Centre. As the world becomes increasingly digital and children spend more time online at younger ages, it's crucial they not only understand the risks but also recognise the potential career opportunities in cybersecurity. Matt Norris, COO at JUMPSEC explains: “Bringing cyber security awareness and education into schools is essential to help pupils protect themselves and to attract some of them to study cyber security or computing related subjects in the future. We had a great morning with these young pupils, and I was impressed by their insightful questions. We are already looking forward to the next school visit.” #cybernews #education #cybereducation #community