<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Tilak Upadhyay</title>
    <description>The latest articles on DEV Community by Tilak Upadhyay (@tilakupadhyay).</description>
    <link>https://dev.to/tilakupadhyay</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2357144%2F57d1dec6-d80b-48af-81bf-516bfd52cc10.jpg</url>
      <title>DEV Community: Tilak Upadhyay</title>
      <link>https://dev.to/tilakupadhyay</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/tilakupadhyay"/>
    <language>en</language>
    <item>
      <title>Why your SBOM is lying to you: Rethinking OWASP A03 for 2026</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Mon, 20 Apr 2026 07:36:46 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/why-your-sbom-is-lying-to-you-rethinking-owasp-a03-for-2026-4e8h</link>
      <guid>https://dev.to/tilakupadhyay/why-your-sbom-is-lying-to-you-rethinking-owasp-a03-for-2026-4e8h</guid>
      <description>&lt;p&gt;&lt;strong&gt;Bad actors aren't breaking into our front door anymore; they’re poisoning the groceries in the stores before they even get into our kitchen.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you’ve been looking at the &lt;strong&gt;OWASP Top 10 for 2025&lt;/strong&gt;, you’ve seen &lt;strong&gt;Software Supply Chain Failure (A03:2025)&lt;/strong&gt; skyrocket to the #3 spot. But if we’re being honest with each other, the way most of us are handling this is broken.&lt;/p&gt;

&lt;p&gt;We’ve fallen into a &lt;strong&gt;compliance-first&lt;/strong&gt; trap. We’re checking boxes, generating massive spreadsheets and drowning our security analysts and developers into hundreds of "Critical" alerts that, in many cases, pose minimal or zero actual risk to the business.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Massive Myth: &lt;em&gt;"A 100% Clean SBOM = Secure"&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
As security professionals, we should know that’s a lie. We can spend an entire quarter patching every CVE in &lt;code&gt;node_modules&lt;/code&gt;, only to realise half of those libraries weren't even being called by our application.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We are essentially chasing ghosts while the actual product roadmap dies.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;To get serious about supply chain security in 2026, we have to move from &lt;strong&gt;Inventory (SBOM)&lt;/strong&gt; to &lt;strong&gt;Context (Reachability + Impact)&lt;/strong&gt;. &lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Here is my point of view to address this issue:&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Context is King: The Power of Reachability
&lt;/h2&gt;

&lt;p&gt;A vulnerability in a transitive dependency only matters if your code actually executes that specific path. In a typical modern application, many of these vulnerabilities are in &lt;code&gt;dead code&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Solution:&lt;/strong&gt; Move toward &lt;strong&gt;Reachability Maps&lt;/strong&gt;. Instead of a flat list, you need a call graph that proves a path exists from your user input to the vulnerable function.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://owasp.org/Top10/2025/A03_2025-Software_Supply_Chain_Failures/" rel="noopener noreferrer"&gt;OWASP A03:2025 documentation&lt;/a&gt; emphasises that the failure isn't just having a vuln, but failing to verify its impact within your specific architecture.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Adopt VEX (Vulnerability Exploitability eXchange)
&lt;/h2&gt;

&lt;p&gt;If you haven’t looked into &lt;strong&gt;VEX&lt;/strong&gt;, you’re missing the most powerful tool in your &lt;em&gt;noise-reduction&lt;/em&gt; arsenal. While an SBOM tells you what’s in the box, a VEX statement tells you if that content is actually dangerous.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Real-World Logic:&lt;/strong&gt; VEX allows you to formally document—in a machine-readable way—that &lt;em&gt;"Yes, CVE-202X-XXXX exists, but our implementation doesn't use the vulnerable method, so we are NOT_AFFECTED."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Refer to the &lt;a href="https://www.ntia.gov/sites/default/files/publications/vex_one-page_summary_0.pdf" rel="noopener noreferrer"&gt;NTIA's VEX Framework&lt;/a&gt; for basic understanding.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. The "Dependency Confusion" Trap (A03 Meets A08)
&lt;/h2&gt;

&lt;p&gt;This is a low-hanging fruit that still leads to breaches. Attackers could have been &lt;em&gt;shadowing&lt;/em&gt; your internal package names on public registries. If your build config isn't scoped strictly, it might pull a malicious &lt;code&gt;internal-only-tool&lt;/code&gt; from the public web instead of your private repo.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Connection:&lt;/strong&gt; This links directly to &lt;strong&gt;Software and Data Integrity Failures (OWASP A08:2025)&lt;/strong&gt;. If you can't verify where your ingredients came from, you can't trust the final dish.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Fix:&lt;/strong&gt; Implement Namespace Scoping (e.g., &lt;code&gt;@my-org/auth-package&lt;/code&gt;). It’s a 5-minute configuration change that prevents a catastrophic supply chain injection.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Verify Build Provenance (The SLSA Framework)
&lt;/h2&gt;

&lt;p&gt;Scanning code is useless if your build server itself is compromised. If a hacker gets into your CI/CD pipeline, they can inject malware after your security tools have finished their scan.&lt;/p&gt;

&lt;p&gt;You need cryptographic proof, &lt;strong&gt;Build Provenance&lt;/strong&gt;, that the binary in production exactly matches the source code you actually reviewed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Framework:&lt;/strong&gt; Follow the &lt;a href="https://slsa.dev/" rel="noopener noreferrer"&gt;SLSA (Supply-chain Levels for Software Artifacts)&lt;/a&gt; guidelines.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Goal:&lt;/strong&gt; We should reach &lt;a href="https://slsa.dev/spec/v1.0/levels#build-l3" rel="noopener noreferrer"&gt;SLSA Level 3&lt;/a&gt;, which ensures our build process is &lt;em&gt;Hardened&lt;/em&gt; and &lt;em&gt;Non-falsifiable&lt;/em&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Move from "Scanning" to "Attestations"
&lt;/h2&gt;

&lt;p&gt;Stop trusting the code and start trusting the &lt;strong&gt;process&lt;/strong&gt;. Use tools like &lt;strong&gt;Sigstore&lt;/strong&gt; or &lt;strong&gt;In-toto&lt;/strong&gt; to cryptographically prove that the code running in production is exactly what left your CI/CD pipeline.&lt;/p&gt;

&lt;p&gt;An Attestation is a signed piece of metadata that says, &lt;em&gt;"I am the build server and I promise I built this specific hash from this specific code commit."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reference:&lt;/strong&gt; See &lt;a href="https://docs.sigstore.dev/" rel="noopener noreferrer"&gt;Sigstore’s documentation&lt;/a&gt; on how to implement &lt;em&gt;keyless&lt;/em&gt; signing. It’s the gold standard for modern integrity.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;The Bottom Line for Security Leaders:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Security in 2026 isn't about having zero vulnerabilities, that’s a fantasy. It’s about &lt;strong&gt;transparency and integrity&lt;/strong&gt;. If you are a security professional, your job isn't to find more bugs. Your job is to provide enough context so that your team only spend time on the risks that actually matter. Stop drowning your team in "Critical" lists. Start focusing on what’s &lt;strong&gt;reachable, verifiable&lt;/strong&gt; and &lt;strong&gt;authentic&lt;/strong&gt;.&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>cybersecurity</category>
      <category>devsecops</category>
      <category>softwareengineering</category>
    </item>
    <item>
      <title>Unpacking Application Security: A Comprehensive Threat Modeling Guide</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Mon, 06 Oct 2025 11:39:51 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/unpacking-application-security-a-comprehensive-threat-modeling-guide-19ck</link>
      <guid>https://dev.to/tilakupadhyay/unpacking-application-security-a-comprehensive-threat-modeling-guide-19ck</guid>
      <description>&lt;p&gt;In the fast-paced world of software development, building features quickly often takes precedence. However, neglecting security early in the development lifecycle can lead to significant technical debt, costly breaches, and reputational damage down the line. This is where &lt;strong&gt;Threat Modeling&lt;/strong&gt; shines. It's not just a buzzword; it's a proactive, structured approach to identifying potential security weaknesses in your application &lt;em&gt;before&lt;/em&gt; they become exploitable vulnerabilities.&lt;/p&gt;

&lt;p&gt;It’s crucial to understand that threat modeling isn't a rigid, one-size-fits-all process. &lt;strong&gt;Different individuals, teams, or organizations may approach threat modeling with varying methodologies, tools, and perspectives based on their unique knowledge, risk appetite, and operational context.&lt;/strong&gt; The walkthrough presented here represents one effective way to conduct a thorough threat model, but it's important to remember that other valid and insightful approaches exist. The core objective remains the same: to systematically think like an attacker to build a stronger defense.&lt;/p&gt;

&lt;p&gt;Let's embark on a practical, end-to-end journey through a threat modeling exercise for a realistic application.&lt;/p&gt;




&lt;h3&gt;
  
  
  The Scenario: "PlexiDocs" - A Secure Document Collaboration Platform
&lt;/h3&gt;

&lt;p&gt;To make this practical, imagine we are the architects behind &lt;strong&gt;PlexiDocs&lt;/strong&gt;, a new cloud-based web application. PlexiDocs is designed for small to medium-sized businesses to securely store, share, and collaborate on highly sensitive documents such as legal contracts, financial reports, and HR records. The emphasis is on strong security and ease of collaboration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Core Features of PlexiDocs:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;User Roles &amp;amp; Access Control:&lt;/strong&gt; The platform distinguishes between two primary user types: &lt;code&gt;Admins&lt;/code&gt; (who can manage users, billing, and all documents) and &lt;code&gt;Members&lt;/code&gt; (who can manage documents they own or are shared with them). Both can upload, view, edit, and delete documents within their permissions.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Document Management:&lt;/strong&gt; Users can upload various document types (PDFs, DOCX, XLSX). For each document uploaded, the application automatically generates a small thumbnail preview to enhance user experience. Documents can be organized into a hierarchical folder structure.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Secure Collaboration:&lt;/strong&gt; Users have the ability to share a specific document with external parties (individuals who are not PlexiDocs users). This is done by generating a unique, hard-to-guess "secret" link. Anyone possessing this link can view the document, but cannot edit or download it directly without further authentication.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;User Authentication &amp;amp; Recovery:&lt;/strong&gt; Users log in with a standard username and password. A "Forgot Password" feature is also implemented, which sends a password reset link to the user's registered email address.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Technical Architecture of PlexiDocs:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Frontend:&lt;/strong&gt; A modern Single-Page Application (SPA) built using a popular JavaScript framework (e.g., React, Angular, Vue.js). This runs entirely in the user's web browser and communicates with the backend via APIs.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Backend API:&lt;/strong&gt; A RESTful API layer (e.g., built with Node.js, Python/Django, Java/Spring Boot) that serves as the central brain of the application. It handles all business logic, user authentication requests, authorization checks, and orchestrates interactions with databases and file storage.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Database:&lt;/strong&gt; A relational SQL database (e.g., PostgreSQL, MySQL) serves two primary functions:

&lt;ul&gt;
&lt;li&gt;  Stores user information, including hashed passwords, user roles, and profile details.&lt;/li&gt;
&lt;li&gt;  Stores document metadata, such as file names, sizes, creation dates, owner IDs, folder paths, and access control lists (ACLs) for shared documents.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;File Storage:&lt;/strong&gt; An object storage service (e.g., Amazon S3, Google Cloud Storage) is used to store the actual, raw document files uploaded by users. The backend API generates temporary, pre-signed URLs, allowing the frontend to directly upload/download files to/from the object storage, which improves performance and reduces backend load.&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Thumbnail Service:&lt;/strong&gt; This is a separate, dedicated microservice. When a new document is uploaded and processed by the Backend API, a notification is sent to this service. It then securely retrieves the document from the file storage, processes it to generate a thumbnail image (e.g., a JPEG or PNG preview), and saves this thumbnail back into the file storage, updating the document metadata.&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;With a clear understanding of PlexiDocs, its features, and its underlying technology, we can now commence our security analysis. Let's put on our security hats and walk through the classic four-step threat modeling process.&lt;/p&gt;




&lt;h3&gt;
  
  
  Step 1: Decompose the Application (What Are We Building?)
&lt;/h3&gt;

&lt;p&gt;The foundational step in threat modeling is to thoroughly understand the system we are trying to secure. We cannot identify vulnerabilities in something we don't fully comprehend. &lt;strong&gt;Application decomposition&lt;/strong&gt; involves breaking down the application into its constituent parts and mapping out how data flows between them. The most effective tool for this is a &lt;strong&gt;Data Flow Diagram (DFD)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;A DFD provides a visual representation using simple, standardized symbols:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;External Entities (Rectangles):&lt;/strong&gt; Users or external systems that interact with our application but are outside its direct control.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Processes (Circles):&lt;/strong&gt; Components that transform or handle data within our application.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Data Stores (Parallel Lines):&lt;/strong&gt; Places where data resides persistently.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Data Flows (Arrows):&lt;/strong&gt; The paths that data takes between entities, processes, and stores.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Trust Boundaries (Dotted Lines):&lt;/strong&gt; Crucially, these delineate areas with different levels of trust. Crossing a trust boundary is often where attackers look for weaknesses.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here’s the DFD for PlexiDocs, outlining these components and their interactions:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs2yrt7j2hz918xkhjmcc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs2yrt7j2hz918xkhjmcc.png" alt="Data Flow Diagram" width="800" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Understanding Key Data Flows:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;User Authentication:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  The &lt;code&gt;User&lt;/code&gt; (E1) initiates a login, sending &lt;code&gt;DF1: User Credentials&lt;/code&gt; to the &lt;code&gt;Authentication Service&lt;/code&gt; (P1).&lt;/li&gt;
&lt;li&gt;  P1 verifies these credentials against &lt;code&gt;D1: User Database&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;  Upon successful login, P1 issues &lt;code&gt;DF2: Session Token&lt;/code&gt; back to the User's browser, enabling subsequent authenticated requests.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Document Upload:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  A logged-in &lt;code&gt;User&lt;/code&gt; (E1) sends &lt;code&gt;DF3: Document Upload Request&lt;/code&gt; to the &lt;code&gt;Document Management Service&lt;/code&gt; (P2).&lt;/li&gt;
&lt;li&gt;  P2 interacts with &lt;code&gt;D2: Document Metadata Database&lt;/code&gt; to record initial metadata.&lt;/li&gt;
&lt;li&gt;  P2 then generates &lt;code&gt;DF4: Signed URL for Upload/Download&lt;/code&gt; and sends it back to the &lt;code&gt;User&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;  The &lt;code&gt;User's&lt;/code&gt; browser uses this signed URL to directly upload the file to &lt;code&gt;D3: File Storage&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Thumbnail Generation:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  After a successful document upload, &lt;code&gt;P2: Document Management Service&lt;/code&gt; sends &lt;code&gt;DF8: New File Notification&lt;/code&gt; to &lt;code&gt;P4: Thumbnail Generation Service&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;  P4 then performs &lt;code&gt;DF9: File Download for Processing&lt;/code&gt; from &lt;code&gt;D3: File Storage&lt;/code&gt;, generates the thumbnail, and executes &lt;code&gt;DF10: Thumbnail Upload&lt;/code&gt; back to D3.&lt;/li&gt;
&lt;li&gt;  Optionally, P4 might update &lt;code&gt;D2: Document Metadata Database&lt;/code&gt; with details about the new thumbnail.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Trust Boundaries are Critical:&lt;/strong&gt;&lt;br&gt;
Observe the dotted lines. The &lt;code&gt;Internet &amp;lt;-&amp;gt; Application Boundary&lt;/code&gt; is the most significant, separating our controlled environment from the untrusted public internet. We also have an &lt;code&gt;Internal Service Boundary&lt;/code&gt; encapsulating the &lt;code&gt;Thumbnail Generation Service&lt;/code&gt;, indicating that this service is potentially isolated and might operate with different trust assumptions or permissions. Any interaction that crosses these boundaries demands heightened security scrutiny.&lt;/p&gt;




&lt;h3&gt;
  
  
  Step 2: Identify Threats (What Can Go Wrong?)
&lt;/h3&gt;

&lt;p&gt;With our DFD clearly illustrating the system's architecture and data flows, we can now systematically brainstorm potential security vulnerabilities. This is where we shift our mindset to think like an adversary. A highly effective and widely adopted framework for this is &lt;strong&gt;STRIDE&lt;/strong&gt;, a mnemonic for six primary categories of threats, developed by Microsoft. We apply STRIDE to each element of our DFD (External Entities, Processes, Data Stores, Data Flows).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;S&lt;/strong&gt;poofing: Pretending to be someone or something you're not. (e.g., impersonating a user or a trusted service)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;T&lt;/strong&gt;ampering: Modifying data or code. (e.g., altering a document, changing a user's role)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;R&lt;/strong&gt;epudiation: Denying that an action took place. (e.g., a user denying they deleted a file, lacking proof)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;I&lt;/strong&gt;nformation Disclosure: Exposing information to unauthorized individuals. (e.g., sensitive data leaks, viewing private documents)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;D&lt;/strong&gt;enial of Service (DoS): Making a system or resource unavailable to legitimate users. (e.g., flooding a server, resource exhaustion)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;E&lt;/strong&gt;levation of Privilege: Gaining capabilities or access beyond what one is authorized for. (e.g., a 'Member' acting as an 'Admin')&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let's apply STRIDE to several key components of PlexiDocs to build a list of potential threats:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Component / Data Flow&lt;/th&gt;
&lt;th&gt;Threat Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Information Disclosure&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Data Flow: &lt;strong&gt;User Credentials&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;(Threat #1)&lt;/strong&gt; Credentials are sent over an unencrypted channel (HTTP), allowing a Man-in-the-Middle attacker to intercept and steal the password.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Elevation of Privilege&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Process: &lt;strong&gt;Document Mgmt Service&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;(Threat #2)&lt;/strong&gt; An authenticated &lt;code&gt;Member&lt;/code&gt; user modifies the document ID in an API call (e.g., &lt;code&gt;/api/docs/123&lt;/code&gt; to &lt;code&gt;/api/docs/124&lt;/code&gt;), bypassing authorization and accessing another user's document (Insecure Direct Object Reference - IDOR).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Repudiation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Process: &lt;strong&gt;Authentication Service&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;(Threat #3)&lt;/strong&gt; An &lt;code&gt;Admin&lt;/code&gt; user performs a sensitive action (e.g., deleting another user account) and later denies having done so. The system lacks robust, immutable audit logging for such critical actions to provide non-repudiable proof.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Denial of Service&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Process: &lt;strong&gt;Thumbnail Service&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;(Threat #4)&lt;/strong&gt; An attacker uploads a computationally intensive file (e.g., a "zip bomb" or a massive image file) designed to exhaust the CPU and memory of the &lt;code&gt;Thumbnail Service&lt;/code&gt;, preventing it from processing legitimate documents.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Information Disclosure&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Process: &lt;strong&gt;Link Sharing Service&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;(Threat #5)&lt;/strong&gt; The "secret" links generated for external sharing use predictable or sequential identifiers, allowing an attacker to enumerate URLs and discover links to other private documents.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Spoofing&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Process: &lt;strong&gt;Thumbnail Service&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;(Threat #6)&lt;/strong&gt; The &lt;code&gt;Thumbnail Service&lt;/code&gt; can be tricked into downloading a file from an arbitrary URL supplied by an attacker instead of from the internal file storage (Server-Side Request Forgery - SSRF), allowing the attacker to scan the internal network.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tampering&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Data Store: &lt;strong&gt;User Database&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;(Threat #7)&lt;/strong&gt; An attacker with SQL injection or direct database access modifies a user's role in the database from &lt;code&gt;Member&lt;/code&gt; to &lt;code&gt;Admin&lt;/code&gt;, gaining full administrative control.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Step 3: Rate the Threats (What Do We Fix First?)
&lt;/h3&gt;

&lt;p&gt;After identifying a multitude of potential threats, we face a critical challenge: we can't fix everything at once. Resources (time, budget, personnel) are always limited. Therefore, we must &lt;strong&gt;prioritize&lt;/strong&gt; the threats based on their potential impact and likelihood of occurrence. A widely used model for this is &lt;strong&gt;DREAD&lt;/strong&gt;, which provides a quantitative way to assess and compare risks.&lt;/p&gt;

&lt;p&gt;From our list generated in Step 2, let's select two distinct and highly illustrative threats to analyze and prioritize:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;Threat #1:&lt;/strong&gt; Information Disclosure due to no HTTPS.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Threat #3:&lt;/strong&gt; Repudiation due to no audit logs.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;DREAD evaluates each threat across five dimensions, typically on a scale of 1 (low) to 10 (high):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;D&lt;/strong&gt;amage Potential: How bad would it be if this threat were successfully exploited? (e.g., minor data loss vs. full system compromise)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;R&lt;/strong&gt;eproducibility: How easy is it for an attacker to reliably reproduce the conditions necessary for the attack? (e.g., requires specific timing vs. happens every time)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;E&lt;/strong&gt;xploitability: How much skill or effort is required to perform the attack? (e.g., expert hacker vs. script kiddie with automated tools)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;A&lt;/strong&gt;ffected Users: How many users would be impacted by a successful exploit? (e.g., a single user vs. the entire user base)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;D&lt;/strong&gt;iscoverability: How easy is it for an attacker to find this vulnerability or weakness? (e.g., hidden deep in code vs. immediately visible)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The total DREAD score is typically the average of these five ratings, with a higher score indicating a more critical threat requiring immediate attention.&lt;/p&gt;

&lt;h4&gt;
  
  
  Threat Analysis 1: Information Disclosure due to no HTTPS (Threat #1)
&lt;/h4&gt;

&lt;p&gt;This threat describes a scenario where an attacker intercepts user credentials because the login or application pages are served over unencrypted HTTP, allowing for easy snooping of sensitive data over a public network.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Damage Potential (D): 8&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; A successful MITM attack on an HTTP login page leads directly to credential compromise, which can result in full account takeover. This gives the attacker access to all of the user's documents and potentially other sensitive functions. This is a severe, high-impact outcome.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Reproducibility (R): 9&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; If a site serves content over HTTP (especially a login form), an attacker on the same local network (e.g., public Wi-Fi) can reliably intercept traffic. Tools for setting up such attacks are common and effective, making this highly reproducible.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Exploitability (E): 7&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; While not a one-click exploit, there are numerous readily available tools (like Wireshark, MITMproxy, SSLStrip) and public guides that significantly lower the bar for executing this type of attack. It doesn't require advanced zero-day expertise.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Affected Users (A): 3&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; This attack typically targets users on a specific compromised network segment or in a particular physical location. While not impacting &lt;em&gt;all&lt;/em&gt; users globally, it can impact any user connected to that network, potentially affecting a significant portion of a small business's workforce using a shared office network.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Discoverability (D): 10&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; The absence of HTTPS is &lt;strong&gt;trivially&lt;/strong&gt; discoverable. Any user or attacker simply needs to look at the URL bar in their browser (which displays "Not Secure" or lacks the padlock icon). Automated scanners also flag this immediately. It requires no special effort to find.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Threat #1 - Average Risk Score: (8+9+7+3+10) / 5 = 7.4 (High Priority)&lt;/strong&gt;&lt;/p&gt;




&lt;h4&gt;
  
  
  Threat Analysis 2: Repudiation due to no audit logs (Threat #3)
&lt;/h4&gt;

&lt;p&gt;This threat describes a situation where an &lt;code&gt;Admin&lt;/code&gt; user performs a critical action (like deleting sensitive documents or user accounts) and later falsely claims they did not perform the action, and the system lacks the necessary immutable audit trails to prove otherwise.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Damage Potential (D): 8&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; The business impact can be severe. Losing the ability to prove who performed a critical action can lead to legal disputes, regulatory non-compliance, financial penalties, internal mistrust, and inability to perform forensic investigations.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Reproducibility (R): 9&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; If the audit logging mechanism for specific actions is non-existent or easily tampered with, an attacker (or rogue insider) can perform the action and deny it 100% of the time. The lack of a log is a consistent flaw.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Exploitability (E): 2&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; This threat requires virtually no technical skill to "exploit." The "attacker" is a legitimate user simply using the application's existing functionality and then lying about it, knowing there's no proof.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Affected Users (A): 5&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; While it might involve a single &lt;code&gt;Admin&lt;/code&gt; user's action, the impact often cascades. If a crucial document is deleted without accountability, it can disrupt an entire team, a project, or even the whole business, affecting many indirect users.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;  &lt;strong&gt;Discoverability (D): 2&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Justification:&lt;/strong&gt; This is a subtle, hidden architectural weakness. It's not something an attacker can "find" by probing the application directly. It's usually discovered only &lt;em&gt;after&lt;/em&gt; an incident occurs and an investigation attempts (and fails) to find evidence in logs.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Threat #3 - Average Risk Score: (8+9+2+5+2) / 5 = 5.2 (Medium Priority)&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Prioritization Conclusion:&lt;/strong&gt;&lt;br&gt;
Based on our DREAD analysis, &lt;strong&gt;Threat #1 (Information Disclosure due to no HTTPS)&lt;/strong&gt; emerges as the highest priority with a score of 7.4. While Threat #3 (Repudiation) is also significant, the immediate and widespread exploitability and discoverability of unencrypted communications make Threat #1 a more urgent and easily exploitable risk that must be addressed first.&lt;/p&gt;




&lt;h3&gt;
  
  
  Step 4: Determine Countermeasures (How Do We Fix It?)
&lt;/h3&gt;

&lt;p&gt;The final step is to design and implement &lt;strong&gt;countermeasures&lt;/strong&gt; (or mitigations) to address the identified and prioritized threats. A robust security strategy emphasizes &lt;strong&gt;defense-in-depth&lt;/strong&gt;, employing multiple layers of controls across different categories: prevention, detection, and response.&lt;/p&gt;

&lt;p&gt;Let's focus on our highest-priority threat: &lt;strong&gt;Threat #1: Information Disclosure due to no HTTPS.&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Strategy&lt;/th&gt;
&lt;th&gt;Countermeasure&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Prevention&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;1. Enforce HTTPS Everywhere:&lt;/strong&gt; This is the most critical and fundamental step. Configure all web servers (frontend and API) to serve &lt;em&gt;only&lt;/em&gt; HTTPS traffic. Implement server-side redirects (HTTP Strict Transport Security - HSTS) to automatically forward any HTTP request to its HTTPS equivalent. HSTS specifically instructs browsers to always connect via HTTPS for your domain, even on subsequent visits, preventing downgrade attacks.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Reduce Impact (Resilience)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;2. Implement Multi-Factor Authentication (MFA):&lt;/strong&gt; Even if an attacker somehow manages to steal a username and password (e.g., via phishing, not just MITM), MFA adds a crucial second layer of verification (e.g., a code from an authenticator app, a biometric scan). This significantly raises the bar for an attacker to gain access, drastically reducing the impact of compromised credentials. &lt;br&gt;&lt;br&gt; &lt;strong&gt;3. Utilize Secure and HttpOnly Flags for Cookies:&lt;/strong&gt; Ensure all session tokens and other sensitive cookies are set with the &lt;code&gt;Secure&lt;/code&gt; flag (cookies are only sent over HTTPS) and the &lt;code&gt;HttpOnly&lt;/code&gt; flag (client-side JavaScript cannot access the cookie, mitigating XSS risks).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;4. Implement Robust Logging &amp;amp; Anomaly Detection:&lt;/strong&gt; Integrate all authentication logs (successful logins, failed attempts, password resets) into a centralized Security Information and Event Management (SIEM) system. Configure alerts for suspicious patterns, such as: &lt;br&gt;     - Multiple failed login attempts from a single IP address (brute-force/credential stuffing). &lt;br&gt;     - Impossible travel (logins from geographically distant locations in a short timeframe). &lt;br&gt;     - Logins from unknown or suspicious IP ranges.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Response&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;5. Develop a Comprehensive Incident Response (IR) Plan:&lt;/strong&gt; A detailed IR plan is essential. This plan should clearly outline steps to take upon detection of a credential compromise or MITM attack. This includes: &lt;br&gt;     - Immediate invalidation of the compromised session token. &lt;br&gt;     - Forcing a password reset for the affected user. &lt;br&gt;     - Notifying the user of the potential compromise. &lt;br&gt;     - Escalation paths and communication protocols for internal teams and, if necessary, external authorities.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Concluding Thoughts
&lt;/h3&gt;

&lt;p&gt;Threat modeling is a continuous, living process, not a one-time exercise. By integrating it into your development lifecycle, you transform security from a reactive, often panicked, afterthought into a proactive, engineering discipline. This structured approach forces us to challenge our assumptions, anticipate attacker behavior, and build security directly into the design, leading to more resilient, trustworthy, and ultimately successful applications. It saves time, reduces costs, and most importantly, protects your users and your business.&lt;/p&gt;




&lt;h3&gt;
  
  
  What Other Techniques Can Be Used for Threat Modeling?
&lt;/h3&gt;

&lt;p&gt;While the STRIDE and DREAD frameworks are highly effective and beginner-friendly, the landscape of threat modeling methodologies is rich and diverse. Each offers a slightly different lens through which to view your system's security:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;PASTA (Process for Attack Simulation and Threat Analysis):&lt;/strong&gt; This is a risk-centric, seven-stage methodology that guides you from understanding business objectives and technical scope to simulating attacks and managing identified risks. It's more comprehensive and business-driven than STRIDE.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;VAST (Visual, Agile, and Simple Threat modeling):&lt;/strong&gt; Designed to integrate seamlessly into Agile and DevOps workflows, VAST emphasizes visual diagrams (like DFDs and process flow diagrams) and aims to be understandable by both technical and non-technical stakeholders across the organization.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Trike:&lt;/strong&gt; A methodology that focuses heavily on defining security requirements, developing threat models, and using them as a security auditing tool. It has a strong emphasis on establishing clear data trustworthiness and authorization rules.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;CVSS (Common Vulnerability Scoring System):&lt;/strong&gt; While not a threat modeling methodology itself, CVSS is the industry standard for rating the &lt;em&gt;severity&lt;/em&gt; of discovered vulnerabilities. It provides a standardized, objective framework (metrics for exploitability, impact, environmental factors) that can be used as an alternative or complementary approach to DREAD for prioritizing risks once identified.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Attack Trees:&lt;/strong&gt; A formal, hierarchical diagramming technique that breaks down a high-level attack goal into more specific sub-goals, which are then broken down further. They help visualize all possible ways an attack could succeed.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Kill Chains (Cyber Kill Chain):&lt;/strong&gt; Originally developed by Lockheed Martin, this framework describes the stages of a successful cyberattack (reconnaissance, weaponization, delivery, exploitation, installation, command &amp;amp; control, actions on objectives). It's more of an operational security framework but can inform threat modeling by helping visualize attacker progression.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Exploring these various techniques will broaden your threat modeling toolkit and allow you to select the best approach for the specific context of your project.&lt;/p&gt;

</description>
      <category>security</category>
      <category>threatmodeling</category>
      <category>appsec</category>
      <category>prodsec</category>
    </item>
    <item>
      <title>A 'feature' of AI can become a 'nightmare' for an organisation - Here's how.</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Fri, 29 Aug 2025 18:48:59 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/a-feature-of-ai-can-become-a-nightmare-for-an-organisation-heres-how-h4a</link>
      <guid>https://dev.to/tilakupadhyay/a-feature-of-ai-can-become-a-nightmare-for-an-organisation-heres-how-h4a</guid>
      <description>&lt;p&gt;The developers are living in an exciting time. A whole new generation of AI-powered terminals, code editors and IDE plugins has emerged, promising to supercharge our productivity. They can write boilerplate code, explain complex algorithms and even debug for us. Many of these tools are free and open-source, making them incredibly tempting to install and try out.&lt;/p&gt;

&lt;p&gt;But in my role in security operations, I've seen the other side of this magic. I've watched as these "helpful" assistants inadvertently become data exfiltration channels, leaking sensitive company information directly from a developer's machine.&lt;/p&gt;

&lt;p&gt;The scary part? The developer is almost always completely unaware it's happening.&lt;/p&gt;

&lt;p&gt;This isn't about some malicious malware. The leak is often a core function of the tool itself. Let's break down how this happens and, more importantly, how you can prevent it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Core Problem: "&lt;em&gt;Leak&lt;/em&gt; is a Feature, Not a Bug"&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To give you a smart, context-aware response, an AI model needs one thing above all else: &lt;em&gt;context&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;When you ask an AI tool to &lt;em&gt;"explain this function"&lt;/em&gt; or &lt;em&gt;"find a command I ran last week"&lt;/em&gt; or &lt;em&gt;"help me to fix this error"&lt;/em&gt;, it doesn't just send your question to a cloud API. It packages up the surrounding "context" to get a better result. And what is that &lt;em&gt;context&lt;/em&gt; basically?&lt;/p&gt;

&lt;p&gt;It's,&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The code in your currently open file.&lt;/li&gt;
&lt;li&gt;The code in all your open tabs.&lt;/li&gt;
&lt;li&gt;Your terminal command history and the output on your screen.&lt;/li&gt;
&lt;li&gt;Sometimes, even file names from your entire project directory.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The process looks like this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You use an AI feature.&lt;/li&gt;
&lt;li&gt;The tool grabs "context" to be helpful.&lt;/li&gt;
&lt;li&gt;It sends that entire package to a cloud-based AI service for processing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If a stray &lt;strong&gt;API key&lt;/strong&gt;, &lt;strong&gt;a database password&lt;/strong&gt;, a piece of customer data or &lt;strong&gt;an intellectual property (IP)&lt;/strong&gt; or even a &lt;strong&gt;private key&lt;/strong&gt;, in that context, it gets sent too. &lt;/p&gt;

&lt;p&gt;Your Network DLP lights up (if configured properly) and people like us in security / SOC may get an alert.&lt;/p&gt;

&lt;h2&gt;
  
  
  Real-World Scenarios I've Seen
&lt;/h2&gt;

&lt;p&gt;These aren't theoretical risks. Based on alerts and logs I've analysed, here are a few anonymised ways these leaks happen, showing you exactly how the data gets packaged and sent (of course by sanitising sensitive data)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 1: The "Intelligent" Terminal&lt;/strong&gt;&lt;br&gt;
Many new terminals use AI for natural language command search. To achieve this, they create "embeddings" (vector representations) of your command history. This involves sending the text content of your terminal buffer to their API.&lt;/p&gt;

&lt;p&gt;I've seen network traces where the tool makes a &lt;code&gt;POST&lt;/code&gt; request to an endpoint like &lt;code&gt;https://api.ai-terminal-app.dev/v1/embeddings&lt;/code&gt;. The JSON payload often looks like this, sending a chunk of your recent terminal session directly:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
   "input_text": "user@host:$ gcloud auth print-access-token\nyour-long-gcp-token-string\nuser@host:$ git push origin feature-branch\nCounting objects: 5, done.\n...",
   "model": "text-embedding-v2"
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Notice how the output of the &lt;code&gt;gcloud&lt;/code&gt; command, which is a temporary but highly sensitive access token, is captured right along with the benign &lt;code&gt;git push&lt;/code&gt; command. You didn't copy it; the tool scraped it as part of its routine context gathering.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 2: The "AI-First" Code Editor&lt;/strong&gt;&lt;br&gt;
These editors let you "chat with your codebase." When you ask a question like, "How can I optimize this function?", the editor sends your code along with your question to a Large Language Model (LLM).&lt;/p&gt;

&lt;p&gt;The API call to an endpoint like &lt;code&gt;https://api.ai-code-editor.com/v2/chat/completions&lt;/code&gt; is often structured with a series of messages. The tool programmatically injects your code as part of the context, like so:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
   "model": "code-gen-pro-4",
   "messages": [
     {
       "role": "system",
       "content": "The user is working with the following file named 'db_connector.py'. Use it as context."
     },
     {
       "role": "user",
       "content": "### Start of file: db_connector.py ###\n\nimport os\n\ndef connect_to_database():\n    # TODO: Move this to a secrets manager later\n    db_password = 'temp_password_for_dev_123!'\n    # ... rest of the connection logic\n\n### End of file ###"
     },
     {
       "role": "user",
       "content": "How can I optimise this function?"
     }
   ]
 }
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The developer's innocent &lt;code&gt;TODO&lt;/code&gt; comment and hardcoded password become part of the prompt payload sent over the internet, triggering a data leak alert.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 3: The "Innocent" Code Analyser Extension&lt;/strong&gt;&lt;br&gt;
This is the most dangerous one. You install a promising AI-powered security linter or code analyzer extension. In the background, it scans your code, perhaps by parsing it into an Abstract Syntax Tree (AST) to understand its structure.&lt;/p&gt;

&lt;p&gt;For its own analytics or to report a "finding" back to a security dashboard, the extension might send telemetry about what it discovers. If it finds a hardcoded secret, its report can include the secret itself as part of the "evidence." The outbound JSON to a diagnostics service could look like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
   "event_type": "code_analysis_finding",
   "file_hash": "e4f5g6h7...",
   "linter_rule": "HardcodedPrivateKey",
   "severity": "critical",
   "code_snippet": "private_key_pem = \"-----BEGIN EC PRIVATE KEY-----\\nMI...H6g==\\n-----END EC PRIVATE KEY-----\"",
   "extension_version": "1.4.1"
 }
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The extension's feature of &lt;u&gt;&lt;em&gt;finding a hardcoded private key&lt;/em&gt;&lt;/u&gt; is genuinely useful. However, in the process of reporting this finding, it exfiltrates the actual key to a third-party server. This instantly turns a local security vulnerability into an active, critical data breach.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A Quick Note on Free v/s Enterprise AI&lt;/strong&gt;&lt;br&gt;
It's important to distinguish these free tools from enterprise-grade, subscription-based AI services like GitHub Copilot for Business, Google's Gemini for Workspace or Azure OpenAI services. Free tools often use your data to train their models—your data is the price you pay.&lt;/p&gt;

&lt;p&gt;Enterprise services, on the other hand, operate under strict data privacy contracts. They typically offer zero-data-retention policies, meaning your code is not stored on their servers or used for model training. This is why your company may pay for one service while blocking another.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Prevent These Leaks and Code Safely
&lt;/h2&gt;

&lt;p&gt;Remediating a leak is a painful fire drill. Preventing one is a simple habit. Here’s how you can protect yourself and your company.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1.⁠ ⁠Cultivate a "Zero-Trust" Mindset for Tools&lt;/strong&gt;&lt;br&gt;
Treat every new tool, especially those with cloud-based AI features, as a potential data leak path. Before you install that shiny new editor or extension, read its privacy policy. Understand what data it collects and where it sends it. If it’s not clear, don’t install it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.⁠ ⁠Configure Your Tools Defensively&lt;/strong&gt;&lt;br&gt;
Dive into the settings menu of your tools. Look for and disable any options related to:&lt;br&gt;
&lt;em&gt;"Send anonymous telemetry"&lt;br&gt;
 "Help improve our models"&lt;br&gt;
 "Enable cloud-based AI suggestions"&lt;/em&gt; (if you can live without them)&lt;br&gt;
Opt-out of everything that isn't always essential for the tool's core function.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.⁠ ⁠Practice Strict Secret Hygiene&lt;/strong&gt;&lt;br&gt;
The best way to prevent secrets from leaking is to never have them in your code in the first place. Not even for a "quick test".&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use &lt;code&gt;.env&lt;/code&gt; files for local development and add them to your &lt;code&gt;.gitignore&lt;/code&gt; - (don’t expose them over the internet unless you’re in the mood to speedrun a career change.)&lt;/li&gt;
&lt;li&gt;Use a proper secrets manager like HashiCorp Vault, AWS Secrets Manager or Google Secret Manager.&lt;/li&gt;
&lt;li&gt;Install pre-commit hooks like Gitleaks or TruffleHog. These tools will scan your code for secrets before you can commit them, stopping a leak before it even begins.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;4.⁠ ⁠Vet Your Extensions&lt;/strong&gt;&lt;br&gt;
Your editor is only as secure as its most permissive extension. Before installing a new one, ask:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Who is the publisher? Is it a reputable company or a random, unknown individual?&lt;/li&gt;
&lt;li&gt;What are the reviews? Do other developers mention privacy concerns?&lt;/li&gt;
&lt;li&gt;Can I do this without an extension? Sometimes, a simple script is safer than a black-box extension.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;5.⁠ ⁠Advocate for Safe, Company-Approved AI&lt;/strong&gt;&lt;br&gt;
If you need AI tools to do your job effectively, talk to your IT and Security teams. They can procure enterprise-grade tools that come with the security and privacy guarantees your organisation needs. It’s better to use a sanctioned tool than to download a free one that puts everyone at risk.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;AI developer tools are a massive leap forward for productivity, but we can't afford to be naive about how they work. By being mindful of the data we expose to them and adopting a few key security habits, we can embrace the benefits of AI without creating a nightmare for our organisations.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Stay safe and code secure.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>SOC Analysts: How to Future-Proof Your Career in the Age of AI</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Fri, 22 Aug 2025 07:32:08 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/soc-analysts-how-to-future-proof-your-career-in-the-age-of-ai-4o7g</link>
      <guid>https://dev.to/tilakupadhyay/soc-analysts-how-to-future-proof-your-career-in-the-age-of-ai-4o7g</guid>
      <description>&lt;p&gt;If you work in a SOC, you already know how it feels: alert fatigue, endless investigations and constant pressure to respond fast. Burnout is common. And when burnout hits, the SOC loses its quality, leading to gaps in defense and even compromising the very purpose of having a SOC in place.&lt;/p&gt;

&lt;p&gt;But with AI, the burning issue of burnout can finally be addressed. Industries are bringing &lt;strong&gt;AI/LLMs&lt;/strong&gt; into SOCs to bring more &lt;strong&gt;outcome, consistency and speed&lt;/strong&gt;. In near future, AI will start handling triage, low level investigation, enrichment and even communication/followups.&lt;/p&gt;

&lt;p&gt;This is great for organizations. But for analysts, it’s a sign: &lt;strong&gt;if you want to grow in your career and stay relevant, you must evolve.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here’s how growth looks at different stages of a SOC career.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. For Junior SOC Analysts: Skill Upgrade
&lt;/h2&gt;

&lt;p&gt;If you’re starting out, your focus should be on expanding your technical depth beyond the traditional &lt;strong&gt;&lt;em&gt;endpoint&lt;/em&gt; &amp;amp; &lt;em&gt;network&lt;/em&gt;&lt;/strong&gt; level threat investigation. That knowledge is valuable, but not enough anymore.&lt;/p&gt;

&lt;p&gt;Invest in building these skills:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cloud Security (CNAPP, CWPP alerts):&lt;/strong&gt; Get comfortable with triaging and investigating Cloud security alerts. These include issues such as exposed storage buckets, overly permissive IAM roles, vulnerable workloads running in containers/VMs, misconfigured security groups or unencrypted data in transit/at rest. Understanding these alerts helps you see how misconfigurations and workload risks translate into real attack paths in the cloud.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Docker and container security (Kubernetes included):&lt;/strong&gt; Learn how insecure container configs, weak isolation or exposed ports can lead to compromise. Junior analysts should learn how investigate and respond to such threats. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;API security and identity/authorization (IAM):&lt;/strong&gt; Understand how weak authentication, over-permissive roles or exposed endpoints create easy entry points for attackers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Web and application-based threat investigation:&lt;/strong&gt; Spot anomalies at the application layer, like injection attempts, credential abuse or suspicious traffic.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CI/CD pipeline security:&lt;/strong&gt; Developers may hardcode secrets, QA may skip security validation and DevOps could push insecure builds. Analysts should learn how to detect and investigate these pipeline missteps.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Application/code-level issues (DAST/SAST &amp;amp; ASM alerts):&lt;/strong&gt; Be comfortable reading and validating findings from security scans, such as insecure dependencies, improper input validation or weak cryptography.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Building these skills ensures you can investigate threats across &lt;strong&gt;modern attack surfaces&lt;/strong&gt; — not just servers and workstations.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. For Mid-Level SOC Analysts: Thinking Beyond the Box
&lt;/h2&gt;

&lt;p&gt;At the mid-level, it’s time to move past pure investigation. You should start building the SOC’s capabilities and thinking in systems.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Log visibility and parsing:&lt;/strong&gt; Ensure all required logs reach the SIEM and are parsed/enriched properly.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Detection engineering:&lt;/strong&gt; Create new detection use cases, tune noisy ones and map alerts to adversary behaviors (MITRE ATT&amp;amp;CK).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Alert quality:&lt;/strong&gt; Develop meaningful alerts that balance sensitivity (catching real threats) with efficiency (avoiding false positives).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Runbooks and workflows:&lt;/strong&gt; Build clear incident runbooks so investigations can be handled consistently, especially by junior analysts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Coverage validation:&lt;/strong&gt; Check all the possible corners of cloud and on-prem environments are fully monitored.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is the transition from &lt;strong&gt;alert responder to SOC builder&lt;/strong&gt;. You’re shaping how the SOC detects and responds to threats.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. For Senior/Lead SOC Analysts: Shaping Security Posture
&lt;/h2&gt;

&lt;p&gt;At the senior level, your focus shifts toward &lt;strong&gt;strategy and posture&lt;/strong&gt;. You’re not only fighting fires — you’re designing the fire prevention system.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Understand SOC maturity:&lt;/strong&gt; Know exactly where your SOC stands today in detection capability, coverage, and response readiness.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identify blind spots:&lt;/strong&gt; Examples include unmanaged endpoints, SaaS apps without logs, cloud misconfigurations (like open storage buckets), or shadow IT systems.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Drive posture improvements:&lt;/strong&gt; Champion the onboarding of new log sources, EDR tools, or advanced correlation. Push for automation that reduce response time and increase visibility.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Threat-informed defense:&lt;/strong&gt; Align SOC detections with adversary behaviors. Ask: &lt;em&gt;“If an attacker used technique X, would we catch it?”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Resilience planning:&lt;/strong&gt; Ensure the SOC can respond quickly, contain threats effectively and prevent repeat incidents.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Business alignment:&lt;/strong&gt; Translate technical weaknesses into &lt;strong&gt;business risks&lt;/strong&gt; leadership understands, ensuring security investments get prioritized.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Senior and lead analysts are not just responders — they are &lt;strong&gt;strategists&lt;/strong&gt; who ensure the SOC evolves with the threat landscape.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thought
&lt;/h2&gt;

&lt;p&gt;AI will soon taking over repetitive triage and investigation tasks. That’s good for SOC efficiency — but for analysts, it’s a career checkpoint.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Juniors:&lt;/strong&gt; focus on building skills in modern environments.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mid-levels:&lt;/strong&gt; think beyond alerts and become detection engineers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Seniors/Leaders:&lt;/strong&gt; design, influence and strengthen the organization’s overall security posture.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The SOC of the future won’t just investigate incidents — it will engineer detections, understand systems deeply and drive security at scale.&lt;/p&gt;

&lt;p&gt;The question is: &lt;strong&gt;are you growing with it?&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>securityoperationscenter</category>
      <category>soc</category>
      <category>career</category>
      <category>ai</category>
    </item>
    <item>
      <title>🛡️ India’s Quantum Cybersecurity Leap: IIT Delhi &amp; DRDO Demonstrate Unhackable Communication</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Tue, 24 Jun 2025 12:31:23 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/indias-quantum-cybersecurity-leap-iit-delhi-drdo-demonstrate-unhackable-communication-21in</link>
      <guid>https://dev.to/tilakupadhyay/indias-quantum-cybersecurity-leap-iit-delhi-drdo-demonstrate-unhackable-communication-21in</guid>
      <description>&lt;p&gt;In a world where even the strongest encryption could one day be cracked by quantum computers, India just took a &lt;strong&gt;giant leap toward future-proof cybersecurity&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;In a landmark demonstration, &lt;strong&gt;IIT Delhi&lt;/strong&gt; and the &lt;strong&gt;DRDO&lt;/strong&gt; successfully achieved &lt;strong&gt;Quantum Secure Communication&lt;/strong&gt; over a 1 km open-air distance — using the bizarre yet beautiful principles of &lt;strong&gt;quantum physics&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;📢 &lt;a href="https://www.pib.gov.in/PressReleasePage.aspx?PRID=2136702" rel="noopener noreferrer"&gt;Official PIB Press Release&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 What Is Quantum Secure Communication (QSC)?
&lt;/h2&gt;

&lt;p&gt;Quantum Secure Communication is a method of &lt;strong&gt;transmitting data in a way that’s inherently protected by the laws of physics&lt;/strong&gt; — not just by algorithms or software.&lt;/p&gt;

&lt;p&gt;The core of this lies in &lt;strong&gt;Quantum Key Distribution (QKD)&lt;/strong&gt;. Here's how it works:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Communication keys are generated using &lt;strong&gt;entangled photons&lt;/strong&gt; — tiny particles of light linked in such a way that their states are perfectly correlated.&lt;/li&gt;
&lt;li&gt;Any attempt to &lt;strong&gt;intercept or observe&lt;/strong&gt; these photons disturbs their state — thanks to the &lt;strong&gt;Heisenberg Uncertainty Principle&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;This disturbance acts as a built-in alarm: if anyone tries to snoop, the system &lt;strong&gt;detects it instantly&lt;/strong&gt; and can discard the compromised key.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In simple terms: &lt;strong&gt;you can't spy on a quantum key without being caught — because physics won’t allow it.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🧪 What Did IIT Delhi &amp;amp; DRDO Demonstrate?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;✅ Established a &lt;strong&gt;1.0 km free-space QKD link&lt;/strong&gt; using entangled photons (no fiber optics, just open air).&lt;/li&gt;
&lt;li&gt;✅ Achieved a &lt;strong&gt;secure key rate of ~240 bits/second&lt;/strong&gt; — enough for real-time encryption.&lt;/li&gt;
&lt;li&gt;✅ Maintained &lt;strong&gt;Quantum Bit Error Rate (QBER) &amp;lt; 7%&lt;/strong&gt;, within secure thresholds.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This proves that &lt;strong&gt;reliable quantum key exchange is possible even without physical cables&lt;/strong&gt;, laying the groundwork for secure communication in battlefield conditions, remote areas and even space.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛡️ Why This Matters for Cybersecurity
&lt;/h2&gt;

&lt;h3&gt;
  
  
  The Challenge:
&lt;/h3&gt;

&lt;p&gt;Current encryption (RSA, ECC, AES) relies on mathematical problems. But &lt;strong&gt;quantum computers&lt;/strong&gt; could break these within minutes in the near future.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Solution:
&lt;/h3&gt;

&lt;p&gt;Quantum Secure Communication uses &lt;strong&gt;physics itself&lt;/strong&gt; to ensure data security.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;🔓 Traditional Encryption&lt;/th&gt;
&lt;th&gt;🔐 Quantum Encryption&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Based on math problems&lt;/td&gt;
&lt;td&gt;Based on physics&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Can be cracked eventually&lt;/td&gt;
&lt;td&gt;Cannot be cracked&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;No built-in tamper alert&lt;/td&gt;
&lt;td&gt;Detects any tampering instantly&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;This breakthrough is a &lt;strong&gt;game-changer&lt;/strong&gt; for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🛡️ Nation-state cyber defense&lt;/li&gt;
&lt;li&gt;🔍 Insider threat detection&lt;/li&gt;
&lt;li&gt;🔐 Securing future-proof data infrastructure&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧰 Cybersecurity Use Cases Across Sectors
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🏛️ Government &amp;amp; Military
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Secure battlefield and border communications&lt;/li&gt;
&lt;li&gt;Tamper-proof inter-agency collaboration&lt;/li&gt;
&lt;li&gt;Quantum-safe national intelligence systems&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🏦 Finance &amp;amp; Infrastructure
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Quantum-resilient banking transactions&lt;/li&gt;
&lt;li&gt;Protection of national stock exchanges and telecom hubs&lt;/li&gt;
&lt;li&gt;Secure SCADA &amp;amp; smart city systems&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🧪 Enterprise &amp;amp; R&amp;amp;D
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Protecting sensitive research and intellectual property&lt;/li&gt;
&lt;li&gt;Securing healthcare data and genomic information&lt;/li&gt;
&lt;li&gt;Future-ready data centers and cloud environments&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🌌 How Physics Makes It Secure – Simplified
&lt;/h2&gt;

&lt;p&gt;Here’s how quantum mechanics secures communication:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;🧪 Quantum Principle&lt;/th&gt;
&lt;th&gt;🔍 What It Does&lt;/th&gt;
&lt;th&gt;🛡️ Cybersecurity Benefit&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Heisenberg Uncertainty&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Observing a quantum particle disturbs it&lt;/td&gt;
&lt;td&gt;Any spying attempt is instantly detected&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Quantum Entanglement&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Two particles share a state even when apart&lt;/td&gt;
&lt;td&gt;Perfectly synced encryption keys&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;No-Cloning Theorem&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Quantum states can't be copied&lt;/td&gt;
&lt;td&gt;Keys can't be intercepted or duplicated&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Unlike classical encryption, this &lt;strong&gt;doesn’t rely on secrets staying hidden&lt;/strong&gt;, but on the &lt;strong&gt;unbreakable laws of nature&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🇮🇳 The Bigger Vision – Quantum India
&lt;/h2&gt;

&lt;p&gt;India’s quantum journey is only accelerating:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🚀 &lt;strong&gt;₹6000 Cr National Quantum Mission&lt;/strong&gt; aims to build a quantum communication network across the country.&lt;/li&gt;
&lt;li&gt;🛰️ Plans for &lt;strong&gt;satellite-based QKD links&lt;/strong&gt; spanning 2000+ km.&lt;/li&gt;
&lt;li&gt;🏢 Deployment of quantum nodes in defense, government, research and financial sectors.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With this demo, India joins the elite group of nations building &lt;strong&gt;quantum-secure internet backbones&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔐 TL;DR – Why It Matters
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;✅ Demonstrated &lt;strong&gt;secure, cable-free quantum communication&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;✅ Communication protected by &lt;strong&gt;laws of physics, not just software&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;✅ Step toward &lt;strong&gt;quantum internet and national cyber defense&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;✅ Built for a &lt;strong&gt;post-quantum world&lt;/strong&gt; — one where today's encryption may no longer protect us&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  💬 Final Thoughts
&lt;/h2&gt;

&lt;p&gt;This isn't just a lab success — it's a national cybersecurity milestone.&lt;/p&gt;

&lt;p&gt;By combining deep physics with cutting-edge technology, India is building a cyber defense strategy that's not just secure for today — but &lt;strong&gt;resilient for the future&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you're in &lt;strong&gt;cybersecurity&lt;/strong&gt;, &lt;strong&gt;policy&lt;/strong&gt;, &lt;strong&gt;defense&lt;/strong&gt; or &lt;strong&gt;tech&lt;/strong&gt;, this is your cue:&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Start learning quantum — the future of secure communication is already being built.&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;✨ &lt;em&gt;Follow for more insights on quantum tech, cybersecurity and India's digital future!&lt;/em&gt;&lt;br&gt;&lt;br&gt;
💬 &lt;em&gt;Got questions or thoughts? Drop them in the comments!&lt;/em&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  QuantumComputing #Cybersecurity #QuantumSecurity #QKD #IITDelhi #DRDO #DigitalIndia #Innovation #Physics #PostQuantumSecurity #QuantumTech #NationalSecurity #India
&lt;/h1&gt;

</description>
      <category>quantumcomputing</category>
      <category>cybersecurity</category>
      <category>quantumsecurity</category>
      <category>qsc</category>
    </item>
    <item>
      <title>Security Operations in 2025: Global Demands, Real Gaps &amp; The Way Forward</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Sat, 21 Jun 2025 12:11:56 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/security-operations-in-2025-global-demands-real-gaps-the-way-forward-4o7k</link>
      <guid>https://dev.to/tilakupadhyay/security-operations-in-2025-global-demands-real-gaps-the-way-forward-4o7k</guid>
      <description>&lt;p&gt;In the ever-evolving threat landscape of 2025, &lt;strong&gt;Security Operations Centers (SOCs)&lt;/strong&gt; are more important than ever—but many are still operating on outdated models. &lt;/p&gt;

&lt;p&gt;While technology evolves rapidly, most SOCs are struggling with a very human problem: &lt;strong&gt;misalignment between expectations, investments and operations&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This blog dives deep into:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🌍 What global enterprises expect from modern SOCs&lt;/li&gt;
&lt;li&gt;❌ Where SOC teams and management are falling short&lt;/li&gt;
&lt;li&gt;🔧 How to bridge the gap across &lt;strong&gt;technical, managerial and monetary&lt;/strong&gt; levels&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🌍 What Modern SOCs Are Expected to Deliver
&lt;/h2&gt;

&lt;p&gt;The days of simple log monitoring are long gone.&lt;/p&gt;

&lt;p&gt;Here’s what global organizations now expect from a modern SOC:&lt;/p&gt;

&lt;p&gt;✅ &lt;strong&gt;Cloud-native detection and response&lt;/strong&gt; (AWS, Azure, GCP)&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Proactive threat hunting&lt;/strong&gt;, not just reactive alerts&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;SOAR-enabled automation&lt;/strong&gt; and MITRE ATT&amp;amp;CK-driven playbooks&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Unified telemetry&lt;/strong&gt; from endpoints, networks, identities and third-party sources&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Support for hybrid work and BYOD environments&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Compliance-aware operations&lt;/strong&gt; (e.g., ISO, NIST CSF, PCI-DSS, GDPR)&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Real-time threat intelligence ingestion and response&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Business-aligned impact analysis and reporting&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;These are &lt;strong&gt;non-negotiables in 2025&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  ❌ Where SOC Teams and Leadership Are Falling Short
&lt;/h2&gt;

&lt;p&gt;Despite this shift, many SOCs still lag behind. Here’s where they’re struggling:&lt;/p&gt;

&lt;h3&gt;
  
  
  🧑‍💼 Managerial Gaps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Focused on alert counts instead of &lt;strong&gt;business impact&lt;/strong&gt; and &lt;strong&gt;MTTD/MTTR&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;No structured escalation paths involving non-technical stakeholders&lt;/li&gt;
&lt;li&gt;Playbooks are either too generic or non-existent&lt;/li&gt;
&lt;li&gt;Hiring junior analysts only, ignoring senior detection engineers and threat hunters&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💸 Monetary Gaps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Overpaying for tools, underpaying for skilled talent&lt;/li&gt;
&lt;li&gt;Security controls and tools are underutilized despite full licensing&lt;/li&gt;
&lt;li&gt;Training and red-teaming seen as "optional"&lt;/li&gt;
&lt;li&gt;Budgets not aligned with actual &lt;strong&gt;attack surface&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🛠️ Technical Gaps
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lack of understanding of modern threat landscapes (e.g., cloud-specific attacks, identity-based threats)&lt;/li&gt;
&lt;li&gt;Poor cloud and application telemetry visibility and correlation&lt;/li&gt;
&lt;li&gt;Ingesting logs without &lt;strong&gt;context&lt;/strong&gt; (asset criticality, business function)&lt;/li&gt;
&lt;li&gt;No automation for common triage tasks (e.g., phishing, IOC enrichment)&lt;/li&gt;
&lt;li&gt;No use of Detection-as-Code, CI/CD, or version control&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔧 How to Bridge the Gap (Realistically)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🧭 Managerial: Run the SOC Like a Business Unit
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Focus KPIs on &lt;strong&gt;MTTD/MTTR&lt;/strong&gt; and &lt;strong&gt;impact reduction&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Simulate not just tech drills, but &lt;strong&gt;business-impact cyber crises&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Encourage cross-skilling between SOC, CloudSec, Compliance and AppSec teams&lt;/li&gt;
&lt;li&gt;Use MITRE ATT&amp;amp;CK to drive both detection and executive reporting&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💰 Monetary: Spend Smarter, Not Bigger
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Review underutilized licenses and reallocate funds to &lt;strong&gt;skills and engineering&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Invest in &lt;strong&gt;purple teaming&lt;/strong&gt;, detection logic development, and &lt;strong&gt;training labs&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Choose tools that integrate well, offer real ROI and reduce alert fatigue&lt;/li&gt;
&lt;li&gt;Consolidate tools where possible to reduce overhead&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  ⚙️ Technical: Make Your SOC Adaptive
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Automate alert triage, IOC enrichment, and phishing analysis using SOAR&lt;/li&gt;
&lt;li&gt;Move to &lt;strong&gt;Detection-as-Code&lt;/strong&gt; with Git, versioning, and automated deployment&lt;/li&gt;
&lt;li&gt;Ingest context-rich data—who the user is, what the asset does, how critical it is&lt;/li&gt;
&lt;li&gt;Build custom detections aligned with your actual threat landscape&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧠 Final Thoughts: Your SOC Is a Strategy, Not Just a Team
&lt;/h2&gt;

&lt;p&gt;The SOC of the future isn’t defined by flashy UIs or a fancy XDR label.&lt;/p&gt;

&lt;p&gt;It’s defined by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;📊 &lt;strong&gt;Business alignment&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;🧠 &lt;strong&gt;Threat-informed decision-making&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;⚙️ &lt;strong&gt;Automation where it matters&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;"The gap between attackers and defenders is not just technical—it's strategic"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;If your SOC isn’t adapting, it’s already lagging.&lt;/p&gt;




&lt;h2&gt;
  
  
  📣 Join the Conversation
&lt;/h2&gt;

&lt;p&gt;Are you seeing similar challenges in your org or region?&lt;br&gt;&lt;br&gt;
How is your team adapting to the growing complexity of threats and tech stacks?&lt;/p&gt;

&lt;p&gt;Drop a comment, and let’s build better SOCs—&lt;strong&gt;together&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you found this useful, follow me here on &lt;a href="https://dev.to/TilakUpadhyay"&gt;Dev.to&lt;/a&gt; for more real-world insights on cybersecurity and security operations.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Fri, 16 May 2025 13:10:19 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/india-needs-cyber-unity-how-government-and-professionals-can-collaborate-to-secure-our-digital-5282</link>
      <guid>https://dev.to/tilakupadhyay/india-needs-cyber-unity-how-government-and-professionals-can-collaborate-to-secure-our-digital-5282</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;🛡️ &lt;strong&gt;In light of recent Indo-Pak tensions, cybersecurity is no longer just a tech issue—it’s a national security imperative.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;While our soldiers guard the physical borders, India’s &lt;strong&gt;digital borders&lt;/strong&gt; are being probed every day by nation-state actors, hacktivists, and opportunistic threat groups.&lt;/p&gt;

&lt;h3&gt;
  
  
  🧠 Key Insight:
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;India’s cybersecurity strategy cannot rely on isolated defense. We need collaboration between the government and cybersecurity professionals.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  🇮🇳 The Reality of India’s Cyber Exposure
&lt;/h2&gt;

&lt;p&gt;From Aadhaar-linked services to cloud-hosted citizen data and internal gov communications—India's digital infrastructure is massive.&lt;/p&gt;

&lt;p&gt;During times of geopolitical tension, we see a surge in:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🕵️‍♂️ Website defacements&lt;/li&gt;
&lt;li&gt;🌐 DDoS attacks on public portals&lt;/li&gt;
&lt;li&gt;🧬 Phishing against officials&lt;/li&gt;
&lt;li&gt;🎯 Propaganda via social media&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;To tackle this, we need more than 'firewalls'. We need strategy, skill and structured partnerships.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🤝 How the Indian Government Can Collaborate with Cybersecurity Professionals
&lt;/h2&gt;

&lt;p&gt;Here are 5 actionable B2G (Business-to-Government) and P2G (Professional-to-Government) partnership models:&lt;/p&gt;

&lt;h3&gt;
  
  
  1️⃣ Create a National Cybersecurity Reserve (NCR)
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;Like a digital army reserve.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Vetted cybersecurity experts from the private sector&lt;/li&gt;
&lt;li&gt;Mobilized during national-level cyber incidents&lt;/li&gt;
&lt;li&gt;Periodic training + structured response readiness&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2️⃣ Launch Public Bug Bounty Programs for Government Platforms
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;Proactive security over reactive firefighting.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Incentivize ethical hackers to find and report bugs&lt;/li&gt;
&lt;li&gt;Rewards, recognition or government certifications&lt;/li&gt;
&lt;li&gt;Encourage trust, transparency and improvement&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3️⃣ Formalize B2G Cybersecurity Alliances
&lt;/h3&gt;

&lt;p&gt;Let’s build stronger cyber bridges between CERT-IN, NIC, and private SOCs — While some collaboration exists today, it still lacks the depth and structure needed to meet modern threats.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sign MoUs with security firms&lt;/li&gt;
&lt;li&gt;Enable real-time threat intel sharing&lt;/li&gt;
&lt;li&gt;Leverage tooling like CNAPP, CTEM, CSPM, etc.&lt;/li&gt;
&lt;li&gt;Modernize the government’s detection and response framework&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4️⃣ Collaborate on Open Threat Intelligence Platforms
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;Community-powered defense is scalable and fast.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Contribute to platforms like MISP, OpenCTI or Indian CTI hubs&lt;/li&gt;
&lt;li&gt;Enrich CERT-IN advisories with field-level visibility&lt;/li&gt;
&lt;li&gt;Foster a collaborative early warning system&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5️⃣ Promote Indigenous Development of Cybersecurity Tools
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;Reduce dependency. Increase capability.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Support Indian devs, researchers, and startups building:

&lt;ul&gt;
&lt;li&gt;CNAPP (Cloud-Native Application Protection)&lt;/li&gt;
&lt;li&gt;CSPM (Cloud Security Posture Management)&lt;/li&gt;
&lt;li&gt;CTEM (Continuous Threat Exposure Management)&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Provide funding, test environments and early adoption opportunities&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  📢 Final Word: Cyber Unity is National Unity
&lt;/h2&gt;

&lt;p&gt;India is digitizing fast—but that comes with cyber risks. Cybersecurity should not remain a siloed government operation.&lt;/p&gt;

&lt;p&gt;We must &lt;strong&gt;build a united cyber defense model&lt;/strong&gt; — powered by trust, collaboration and shared responsibility.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;🇮🇳 Let’s bring policymakers and professionals to the same table.&lt;br&gt;&lt;br&gt;
Let’s defend our digital borders — together.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;✌️ Stay sharp. Stay secure.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Follow me&lt;/strong&gt; for more posts on Cybersecurity, SOC and real-world defense.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>cloudsecurity</category>
      <category>infosec</category>
      <category>govtech</category>
    </item>
    <item>
      <title>Why Cloud Security Knowledge is No Longer Optional for SOC Analysts 🛡️☁️</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Sun, 20 Apr 2025 17:28:27 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/why-cloud-security-knowledge-is-no-longer-optional-for-soc-analysts-3gb6</link>
      <guid>https://dev.to/tilakupadhyay/why-cloud-security-knowledge-is-no-longer-optional-for-soc-analysts-3gb6</guid>
      <description>&lt;p&gt;The cybersecurity landscape is evolving rapidly—and so must we.&lt;/p&gt;

&lt;p&gt;As someone actively working in a Security Operations Center (SOC), I recently went through a hiring phase where I interacted with several candidates ranging from entry-level analysts to experienced seniors. One thing stood out starkly: &lt;strong&gt;a significant gap in cloud security knowledge&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  🔍 What I Observed During the Hiring Process
&lt;/h2&gt;

&lt;p&gt;Most of the candidates I interviewed had strong exposure to &lt;strong&gt;Microsoft Defender product suites&lt;/strong&gt; or &lt;strong&gt;AWS GuardDuty&lt;/strong&gt;. While these are undoubtedly powerful tools, depending solely on them is &lt;em&gt;definitely not enough&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;The reality is: &lt;strong&gt;cyber threats are no longer confined to on-premises environments&lt;/strong&gt;. Organizations are migrating their workloads to cloud platforms like AWS, Azure, and GCP at an unprecedented rate. But sadly, many SOC professionals are still stuck with a legacy mindset and tooling.&lt;/p&gt;

&lt;p&gt;This gap becomes a serious concern when incidents arise in cloud-native environments and the analysts are unsure how to investigate or even detect them effectively.&lt;/p&gt;

&lt;h2&gt;
  
  
  ☁️ Why Cloud Security Skills Are Essential in Modern SOCs
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. &lt;strong&gt;Cloud is the New Normal&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Most companies are running hybrid or fully cloud-native environments. SOCs must monitor cloud activity with the same rigor as on-prem systems.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. &lt;strong&gt;Cloud Threats Are Unique&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Threat actors are adapting fast to cloud environments, and traditional detection methods are falling short. Unique challenges in cloud include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Misconfigured storage buckets exposing sensitive data to the internet.&lt;/li&gt;
&lt;li&gt;Over-permissive IAM roles leading to privilege escalation.&lt;/li&gt;
&lt;li&gt;Serverless function abuse (e.g., AWS Lambda) for data exfiltration or persistence.&lt;/li&gt;
&lt;li&gt;Abuse of metadata APIs within cloud instances to extract credentials.&lt;/li&gt;
&lt;li&gt;Container escape attacks via misconfigured Docker/Kubernetes environments.&lt;/li&gt;
&lt;li&gt;Cross-account access abuse via trust relationships.&lt;/li&gt;
&lt;li&gt;Shadow IT—untracked workloads or services running in cloud environments without proper visibility.&lt;/li&gt;
&lt;li&gt;Multi-cloud complexity—organizations often use multiple cloud providers, each with different logging formats, threat surfaces and controls.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. &lt;strong&gt;Cloud Logs ≠ Traditional Logs&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;SOC analysts need to become fluent in logs from:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;AWS&lt;/strong&gt;: CloudTrail, Config, CloudWatch, VPC Flow Logs
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Azure&lt;/strong&gt;: Activity Logs, Defender for Cloud, Sentinel, Log Analytics
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GCP&lt;/strong&gt;: Audit Logs, VPC Flow Logs, Security Command Center&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. &lt;strong&gt;Tooling Isn’t Enough&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Relying only on GuardDuty or Defender alerts is dangerous. Analysts must:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Correlate multiple cloud-native logs
&lt;/li&gt;
&lt;li&gt;Understand cloud behavior and threat models
&lt;/li&gt;
&lt;li&gt;Write and test their own detection rules
&lt;/li&gt;
&lt;li&gt;Perform forensic investigations in cloud environments&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🔧 The Growing Role of CSPM, CTEM, CNAPP, and Other Cloud Security Tools
&lt;/h2&gt;

&lt;p&gt;Cloud security is not just about logs and alerts—it’s also about &lt;strong&gt;visibility, misconfiguration detection, and proactive risk management&lt;/strong&gt;. Here's why SOC teams need to be aware of tools like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CSPM (Cloud Security Posture Management)&lt;/strong&gt;: Tools like AWS Security Hub, Azure Security Center, Wiz, Prisma Cloud
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CTEM (Continuous Threat Exposure Management)&lt;/strong&gt;: Prioritizes exposure based on real-time threat intelligence and business context
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CNAPP (Cloud-Native Application Protection Platform)&lt;/strong&gt;: Combines CSPM, CWPP, CIEM, and more to give a full-stack view
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWPP (Cloud Workload Protection Platform)&lt;/strong&gt;: Offers runtime protection for VMs, containers and serverless
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CIEM (Cloud Infrastructure Entitlement Management)&lt;/strong&gt;: Manages and secures cloud identities and permissions&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🐳 The Rising Need for Container Security
&lt;/h2&gt;

&lt;p&gt;SOC teams must also upskill in &lt;strong&gt;container security&lt;/strong&gt;, especially with the growing adoption of &lt;strong&gt;Kubernetes&lt;/strong&gt; and &lt;strong&gt;Docker&lt;/strong&gt;-based microservices. Key focus areas:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Image vulnerabilities (pre-deployment scanning)
&lt;/li&gt;
&lt;li&gt;Runtime behavior monitoring
&lt;/li&gt;
&lt;li&gt;Kubernetes misconfiguration detection
&lt;/li&gt;
&lt;li&gt;Container-to-container communication visibility
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Essential tools include &lt;strong&gt;Aqua Security&lt;/strong&gt;, &lt;strong&gt;Sysdig&lt;/strong&gt;, &lt;strong&gt;Falco&lt;/strong&gt;, &lt;strong&gt;Twistlock&lt;/strong&gt;, and &lt;strong&gt;Kube-bench&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  📚 What SOC Analysts Should Learn to Stay Relevant
&lt;/h2&gt;

&lt;p&gt;If you're a SOC analyst (or planning to become one), here’s what you should focus on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cloud Fundamentals&lt;/strong&gt;: IAM, networking, compute, and storage in AWS/Azure/GCP
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Logging and Monitoring&lt;/strong&gt;: Cloud-native logs and centralization techniques
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Detection Engineering&lt;/strong&gt;: Use Sigma, KQL, custom queries in SIEMs
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Proactive Security&lt;/strong&gt;: Hands-on with CSPM, CNAPP, and CTEM tools
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cloud IR and Forensics&lt;/strong&gt;: Investigate breaches in dynamic, ephemeral environments
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Container Security&lt;/strong&gt;: Understand images, orchestrators, runtime threats&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  💡 Final Thoughts: Adapt or Fall Behind
&lt;/h2&gt;

&lt;p&gt;Cloud isn’t just a trend—it’s a foundational shift in how infrastructure is built, deployed, and attacked. If you're a SOC analyst and haven’t explored the cloud security domain yet, &lt;strong&gt;now is the time&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Whether you're a beginner or seasoned professional, &lt;strong&gt;cloud security expertise is quickly becoming a baseline, not a bonus&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;✋ Are you seeing the same skill gaps in your SOC teams or during hiring?&lt;br&gt;&lt;br&gt;
Let's start a discussion in the comments below!&lt;/p&gt;

&lt;p&gt;Feel free to connect—I’d love to hear your thoughts and experiences.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Credential Dumping: NTDS.dit Dump Detection</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Wed, 06 Nov 2024 09:14:22 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/credential-dumping-ntdsdit-dump-detection-3goi</link>
      <guid>https://dev.to/tilakupadhyay/credential-dumping-ntdsdit-dump-detection-3goi</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;In the first two parts of this series, we explored credential dumping techniques involving &lt;strong&gt;NTLM hash extraction&lt;/strong&gt; and &lt;strong&gt;LSASS memory dumps&lt;/strong&gt;. In this third part, we'll focus on the detection of &lt;strong&gt;NTDS.dit dumps&lt;/strong&gt;—a critical component of Active Directory that stores all domain data, including user credentials.&lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding NTDS.dit and Its Significance
&lt;/h2&gt;

&lt;p&gt;The &lt;strong&gt;NTDS.dit&lt;/strong&gt; file is the Active Directory database that resides on domain controllers, containing information about user accounts, groups, and password hashes. Attackers target this file to extract credential data, enabling unauthorized access and lateral movement within a network.&lt;/p&gt;

&lt;h2&gt;
  
  
  Common Techniques for Dumping NTDS.dit
&lt;/h2&gt;

&lt;p&gt;Attackers employ various methods to extract the NTDS.dit file:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Volume Shadow Copy Service (VSS)
&lt;/h3&gt;

&lt;p&gt;Attackers use tools like &lt;code&gt;vssadmin&lt;/code&gt; or &lt;code&gt;ntdsutil&lt;/code&gt; to create shadow copies of the volume containing NTDS.dit, bypassing file locks.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Built-in Utilities
&lt;/h3&gt;

&lt;p&gt;Tools such as &lt;code&gt;ntdsutil&lt;/code&gt; can be misused to create backups of the NTDS.dit file.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Direct File Access
&lt;/h3&gt;

&lt;p&gt;With sufficient privileges, attackers might attempt to directly copy the &lt;strong&gt;NTDS.dit&lt;/strong&gt; file from its default location:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;%SystemRoot%\NTDS\Ntds.dit
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Detection Strategies
&lt;/h2&gt;

&lt;p&gt;To identify potential &lt;strong&gt;NTDS.dit&lt;/strong&gt; dumping activities, consider the following detection methods:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Monitor Command Execution
&lt;/h3&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Command-Line Analysis&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Detect the use of commands associated with shadow copy creation and NTDS.dit access. For example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;vssadmin create shadow
ntdsutil "ac i ntds" "ifm" "create full"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  &lt;strong&gt;SIEM Detection Query Example&lt;/strong&gt;
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;event_id:4688 AND (command_line:"vssadmin create shadow" OR command_line:"ntdsutil \"ac i ntds\" \"ifm\" \"create full\"")
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  2. File Access Monitoring
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;NTDS.dit File Access&lt;/strong&gt;: Monitor attempts to access or copy the NTDS.dit file, especially from non-standard processes or users.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shadow Copy Access&lt;/strong&gt;: Track access to shadow copy directories where NTDS.dit might be extracted.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Registry Monitoring
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SYSTEM Hive Access&lt;/strong&gt;: Monitor access to the SYSTEM registry hive, as it's required to decrypt password hashes from NTDS.dit.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Anomalous Tool Usage
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Penetration Testing Tools&lt;/strong&gt;: Detect the use of tools like PowerSploit's &lt;code&gt;Invoke-NinjaCopy&lt;/code&gt;, which can copy locked files like NTDS.dit.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Measures
&lt;/h2&gt;

&lt;p&gt;To reduce the risk of &lt;strong&gt;NTDS.dit&lt;/strong&gt; dumping:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Restrict Administrative Privileges&lt;/strong&gt;: Limit administrative access on domain controllers to essential personnel only.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Disable Unnecessary Services&lt;/strong&gt;: If VSS is not required, consider disabling it to prevent its misuse.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Regular Audits&lt;/strong&gt;: Conduct regular audits of domain controllers for unauthorized shadow copies or backups.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network Segmentation&lt;/strong&gt;: Isolate domain controllers in a secure network segment to limit exposure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Implement File Integrity Monitoring&lt;/strong&gt;: Use tools to monitor critical files like NTDS.dit for unauthorized access or changes.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Detecting and preventing &lt;strong&gt;NTDS.dit dumping&lt;/strong&gt; is crucial for maintaining the security of an &lt;strong&gt;Active Directory&lt;/strong&gt; environment. By implementing robust monitoring and stringent access controls, organizations can safeguard against unauthorized access to sensitive credential data.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The information provided here is based on current best practices and known attack vectors as of &lt;strong&gt;March 2025&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;🚀 &lt;em&gt;Follow me for more cybersecurity insights and detection techniques!&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>threathunting</category>
      <category>credentialdumping</category>
    </item>
    <item>
      <title>Credential Dumping: LSASS Memory Dump Detection</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Wed, 06 Nov 2024 09:01:09 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/credential-dumping-lsass-memory-dump-detection-3401</link>
      <guid>https://dev.to/tilakupadhyay/credential-dumping-lsass-memory-dump-detection-3401</guid>
      <description>&lt;h2&gt;
  
  
  What is LSA/LSASS?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;LSA (Local Security Authority)&lt;/strong&gt; is a component of Windows that enforces security policies on a system, managing user logins and maintaining information about all aspects of the system’s security, including logins, authentication and privileges.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LSASS (Local Security Authority Subsystem Service)&lt;/strong&gt;, represented by the process &lt;code&gt;lsass.exe&lt;/code&gt;, is the part of LSA that actually runs on the system to enforce these security policies. It is responsible for authenticating users and storing sensitive information such as password hashes and Kerberos tickets in its memory during active sessions. Because LSASS stores credentials and session tokens, it is a common target in attacks aimed at credential theft.&lt;/p&gt;

&lt;h2&gt;
  
  
  Various Methods for Extracting LSASS Memory
&lt;/h2&gt;

&lt;p&gt;Various techniques, such as using ProcDump, PowerSploit or Mimikatz, enable attackers to extract NTLM hashes from system memory, risking unauthorized access. This article covers each method in detail, including detection techniques and false positive chances.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Using ProcDump (Windows Native Utility)
&lt;/h3&gt;

&lt;p&gt;ProcDump is a legitimate Windows utility commonly used for creating process memory dumps. Attackers use it to avoid detection while capturing sensitive data from LSASS memory.&lt;/p&gt;

&lt;h4&gt;
  
  
  Example Command:
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;procdump.exe -accepteula -ma lsass.exe lsass.dmp
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Detection Query:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;SIEM: &lt;code&gt;event_id:4688 AND process_name:"procdump.exe" AND command_line:"lsass.exe"&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;EDR: &lt;code&gt;command_line contains "procdump.exe" AND command_line contains "lsass.exe"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  False Positive Chances:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Medium - Windows administrators can use ProcDump to create an LSASS memory dump for debugging purposes.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Using comsvcs.dll (Windows Native DLL)
&lt;/h3&gt;

&lt;p&gt;Attackers can use the &lt;code&gt;comsvcs.dll&lt;/code&gt; library to directly dump LSASS memory. This is often seen as a less conspicuous method because it’s a native Windows DLL.&lt;/p&gt;

&lt;h4&gt;
  
  
  Example Command:
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump (Get-Process lsass).id &amp;lt;Path\to\dump&amp;gt; full
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Detection Query:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;SIEM: &lt;code&gt;event_id:4688 AND process_name:"rundll32.exe" AND command_line:"comsvcs.dll" AND command_line:"minidump"&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;EDR: &lt;code&gt;process_name contains "rundll32.exe" AND command_line contains "comsvcs.dll, minidump"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  False Positive Chances:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Low - &lt;code&gt;rundll32.exe&lt;/code&gt; is a legitimate Windows utility and it's abuse with &lt;code&gt;comsvcs.dll&lt;/code&gt; is unusual.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Using PowerSploit MiniDump
&lt;/h3&gt;

&lt;p&gt;PowerSploit’s MiniDump function allows attackers to dump LSASS memory through PowerShell. This method can evade detection if PowerShell script-block logging is not enabled. The attacker uses PowerShell to dump LSASS memory with &lt;code&gt;Out-MiniDump&lt;/code&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Example Command:
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Get-Process lsass | Out-MiniDump
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Detection Query:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;SIEM: &lt;code&gt;event_id:4104 AND process_name:"powershell.exe" AND command_line:"Out-MiniDump"&lt;/code&gt; (NOTE: PowerShell event logging must be enabled)&lt;/li&gt;
&lt;li&gt;EDR: &lt;code&gt;process_name contains "powershell.exe" AND command_line contains "Out-MiniDump"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  False Positive Chances:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Low - Usage of &lt;code&gt;Out-MiniDump&lt;/code&gt; is very unusual.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Using SekurLSA (Mimikatz)
&lt;/h3&gt;

&lt;p&gt;Mimikatz is a tool commonly used for credential dumping. It can dump LSASS memory, extract NTLM hashes, and perform pass-the-hash attacks.&lt;/p&gt;

&lt;h4&gt;
  
  
  Example Command:
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sekurlsa::Minidump lsass.dmp
sekurlsa::logonPasswords
sekurlsa::pth
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Detection Query:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;EDR: &lt;code&gt;process_name contains "mimikatz.exe" OR command_line contains "sekurlsa::"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  False Positive Chances:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Very Low - Almost exclusively used for malicious purposes.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Using Windows Credential Editor (WCE)
&lt;/h3&gt;

&lt;p&gt;WCE is another utility capable of extracting live NTLM hashes from a machine.&lt;/p&gt;

&lt;h4&gt;
  
  
  Example Command:
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;wce64.exe
wce32.exe
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Detection Query:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;EDR: &lt;code&gt;process_name contains "wce64.exe" OR process_name contains "wce32.exe" OR process_name contains "wce.exe"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  False Positive Chances:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Very Low - Uncommon in legitimate operations.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>threathunting</category>
      <category>credentialdumping</category>
    </item>
    <item>
      <title>Credential Dumping: NTLM Hash Dump</title>
      <dc:creator>Tilak Upadhyay</dc:creator>
      <pubDate>Wed, 06 Nov 2024 08:21:48 +0000</pubDate>
      <link>https://dev.to/tilakupadhyay/credential-dumping-ntlm-hash-detection-and-prevention-2ihn</link>
      <guid>https://dev.to/tilakupadhyay/credential-dumping-ntlm-hash-detection-and-prevention-2ihn</guid>
      <description>&lt;h2&gt;
  
  
  What is NTLM?
&lt;/h2&gt;

&lt;p&gt;NTLM (&lt;strong&gt;NT LAN Manager&lt;/strong&gt;) is a suite of Microsoft security protocols designed to provide authentication and encryption for users accessing network resources. NTLM was introduced in the early versions of Windows and is now largely considered outdated, yet it remains prevalent in various systems due to compatibility with legacy applications and networks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Data Stored in NTLM:
&lt;/h3&gt;

&lt;p&gt;NTLM stores crucial credential data in the form of hashes rather than plaintext passwords, enhancing security by preventing exposure of actual passwords. The primary types of data associated with NTLM include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;User Password Hashes&lt;/strong&gt;: NTLM generates a hash from a user’s password, which is stored in a secure location. When a user attempts to authenticate, the system hashes the input password and compares it to the stored hash.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Challenge/Response Mechanism&lt;/strong&gt;: NTLM uses a challenge/response mechanism for authentication. When a user logs in, the server sends a challenge to the client. The client then uses its password hash to compute a response, which is sent back to the server for validation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Session Keys&lt;/strong&gt;: NTLM can generate session keys during authentication to encrypt communications between the client and server, ensuring confidentiality and integrity of data exchanged during the session.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Identifiers (SIDs)&lt;/strong&gt;: NTLM also utilizes SIDs to uniquely identify users and groups within Windows environments, facilitating access control and permissions management.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What is NTLM Credential Dumping?
&lt;/h2&gt;

&lt;p&gt;NTLM Credential dumping is a critical post-exploitation activity where an attacker collects NTLM hashes from a compromised Windows system. &lt;/p&gt;

&lt;p&gt;Once attackers extract NTLM hashes, they can use them in &lt;strong&gt;pass-the-hash&lt;/strong&gt; attacks, enabling unauthorized access or lateral movement within a network. This article outlines the methods of NTLM hash extraction, detection strategies and the chances of generating false positives when detecting these activities using SIEM and EDR queries.&lt;/p&gt;

&lt;h3&gt;
  
  
  NTLM hashes are commonly found in two locations:
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;1. Non-Domain Controller Systems (e.g., Workstations and Servers)&lt;/strong&gt;: NTLM hashes are primarily stored in the memory of the LSASS (Local Security Authority Subsystem Service) process. This process manages security policies and handles account logins, which makes it a target for credential dumping attacks on individual workstations and servers.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;To know more about how an LSASS memory dump can be detected, refer,&lt;/strong&gt;
&lt;div class="ltag__link"&gt;
  &lt;a href="/tilakupadhyay" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2357144%2F57d1dec6-d80b-48af-81bf-516bfd52cc10.jpg" alt="tilakupadhyay"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/tilakupadhyay/credential-dumping-lsass-memory-dump-detection-3401" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Credential Dumping: LSASS Memory Dump Detection&lt;/h2&gt;
      &lt;h3&gt;Tilak Upadhyay ・ Nov 6 '24&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#threathunting&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#credentialdumping&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2. Domain Controller Systems&lt;/strong&gt;: On domain controllers, NTLM hashes are stored within the NTDS.dit file—the Active Directory database file. This file contains hashed credentials for all users in the domain, making it a high-value target for attackers aiming to compromise a network. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;For more information on NTDS.dit extraction techniques and detection methods, refer,&lt;/strong&gt;
&lt;div class="ltag__link"&gt;
  &lt;a href="/tilakupadhyay" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2357144%2F57d1dec6-d80b-48af-81bf-516bfd52cc10.jpg" alt="tilakupadhyay"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/tilakupadhyay/credential-dumping-ntdsdit-dump-detection-3goi" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Credential Dumping: NTDS.dit Dump Detection&lt;/h2&gt;
      &lt;h3&gt;Tilak Upadhyay ・ Nov 6 '24&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#threathunting&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#credentialdumping&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>threathunting</category>
      <category>credentialdumping</category>
    </item>
  </channel>
</rss>
