blog

Application security and Vulnerability management leveraging open source and open source intelligence

open source intelligence by appsec phoenix

At appsec phoenix, we do a lot of research and run intelligence services. Nonetheless, we all come from years of practice in the application, vulnerability management and open-source intelligence.

Each week we will cover a topic that spans vulnerability management, cloud security, and application security.

We will cover a post on open-source intelligence and Open Source Security, OSS security tools available every week.

Vulnerability management definition

Vulnerability management is the process of identifying, assessing, and mitigating vulnerabilities in computer systems. It is a critical part of cybersecurity, as vulnerabilities can be exploited by malicious actors to gain access to systems, data, and networks.

The goal of vulnerability management is to reduce the risk of successful attacks by identifying and addressing vulnerabilities before they can be exploited. This requires a comprehensive and ongoing approach that includes everything from patch management to system hardening to user education.

Vulnerability management is an essential part of any cybersecurity program, and organizations of all sizes need a robust vulnerability management plan.

Application security definition

Application security is the process of protecting applications from hazards and vulnerabilities. It includes identifying, classifying, and mitigating risks to the security of an application. Application security is a subset of cybersecurity.

Many different types of risks can threaten the security of an application. These risks can be divided into two categories: internal risks and external risks. Internal risks originate within the organisation, such as careless employees or malicious insiders. External risks come from outside the organization, such as hackers or malware.

To properly protect an application from risks, it is important to identify and assess its risks. Once the risks have been identified, they can be mitigated through security controls. Security controls are measures put in place to reduce the likelihood and/or impact of a security incident. They

This week we start with analysing a minimum stack for application and vulnerability management.

Open source is increasingly being used in cybersecurity intelligence. Here’s how you can use it to bolster your organization’s security posture. Open source software (OSS) is any software whose source code is available for anyone to use, modify, and distribute. OSS is often developed collaboratively, with developers from all over the world contributing to its development. While OSS has traditionally been used primarily by developers, it is now also used in other areas, including cybersecurity. In cybersecurity, OSS can be used in several ways, including: – To find and fix vulnerabilities in software – To create and manage security incident response plans – For intelligence gathering Using OSS in cybersecurity can help organizations save time and money, as well as improve their security posture. When used correctly, OSS can be a powerful

Some references for this week as a framework

1) Static code analyser – https://github.com/ShiftLeftSecurity/sast-scan 

2) Dependency-Check – https://github.com/jeremylong/DependencyCheck

   also npm audit

3) Code relationships – https://github.com/crubier/code-to-graph 

3) Cloud Assessment – Prowler – https://github.com/toniblyx/prowler

https://github.com/google/tsunami-security-scanner

4) Network assessment – Nettacker – https://github.com/zdresearch/OWASP-Nettacker

   > Tsunami – https://github.com/google/tsunami-security-scanner

*) Vulnerability Management, Scanners and intelligence framework

  1. intelligence framework – https://github.com/intelowlproject/IntelOwl
  2. Attack flow: https://github.com/center-for-threat-informed-defense/attack-flow
Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Owasp top 10 has been a pillar over the years; sister to CWE – Common Weakness Enumeration we provide an overview of the top software vulnerabilities and web application security risks with a data-driven approach focused on helping identify what risk to fix first.
Francesco Cipollone
The Cloud Security and AppSec teams at Phoenix Security are pleased to bring you another set of new Phoenix Security features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Asset and Vulnerability Management – Associate assets with multiple Applications and Environments – Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
With cyber threats growing in sophistication, understanding exploitability has become crucial for security teams to prioritize vulnerabilities effectively. This article explores the key factors that influence the likelihood of exploits in the wild, including attack vectors, complexity levels, privileges required, and more. You’ll learn how predictive scoring systems like EPSS are bringing added dimensions to vulnerability analysis, going beyond static scores. We discuss the importance of monitoring verified threat feeds and exploiting trends from reliable sources, instead of getting distracted by unverified claims and noise. Adopting a risk-based approach to prioritization is emphasized, where critical vulnerabilities are addressed not just based on CVSS severity, but also their likelihood of being exploited and potential business impact. Recent major exploits like Log4Shell are highlighted to stress the need for proactive security. Equipped with the insights from this guide, you’ll be able to implement a strategic, data-backed approach to focusing on the most pertinent risks over the barrage of vulnerabilities.
Francesco Cipollone
The Cloud Security and AppSec teams at Phoenix Security are pleased to bring you another set of new Phoenix Security features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Improved Management your Vulnerabilities and Assets Display “Closed” vulnerabilities list page Display vulnerability stats in Asset screens Override asset exposure for whole Apps/Envs Filter on-screen dynamic statistical and insights Risk-based Posture Management Update risk formula structure Update Vuln risk formula factors Integrations Configure “vulnerability types” fetched from SonarCloud/SonarQube Users can manually trigger a “scanner refresh” Update Jira tickets when the associated vulnerability is closed Other Improvements Handle large number of items in Treemap chart Improved scanner flow: don’t fetch targets until needed Improved performance of MTTR queries
Alfonso Eusebio

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x Logo: ShieldPRO
This Site Is Protected By
ShieldPRO