SlideShare a Scribd company logo
Uncover
Vulnerabilities
Beyond Software
Vulnerabilities
CHANDRASHEKHAR B
Founder and CEO, SecPod
WHAT IS A
VULNERABILITY?
02
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Vulnerability is a security loophole that can
be exploited by cybercriminals to gain
unauthorized access to the network.
However, CVEs or Software Vulnerabilities
are only considered as vulnerability leaving
behind the other security loopholes.
Are managing only CVEs or Software
vulnerabilities sufficient to prevent Cyber
Attacks?
03
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Logon AutoStart
Untrusted Apps
Hardcoded secrets in PowerShell Script
Misconfigured Account Privileges
DNS Cache Poisoning
Exposed Assets and Data Sources
Poisoned Software Packages
Bypassing Security Controls
WHAT ARE ATTACKERS EXPLOITING TODAY?
Exposed Network Shares
Run or Start up Programs
VPN Software
Sensitive Information in Logs &
Scripts
04
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
MITRE
ATTACK TECHNIQUES
 Logon AutoStart Execution
 DNS/DHCP Spoofing
 Start-up Folders
 Kernel Modules & Extension
 Logon Scripts
 Browser bookmark discovery/ Extensions
 Password Guessing
 Clipboard data
 Cloud discovery services
 Command & Script Interpreters/ PowerShell
 Python/ VB Scripts/JavaScript
 Web Services/ Cloud Services
 Network Share drives
 Digital Certificates
 File & Directory permissions
DIFFERENT TYPES OF
VULNERABILITIES
IN AN ATTACK SURFACE
05
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
06
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
SOFTWARE
VULNERABILITIES
Software vulnerability is a defect in a software
that could allow an attacker to gain
unauthorized access to the network. Some of
the popular software vulnerabilities include:
 Apache Webserver
 Log4J
 Exchange Servers
 Spring4shell
07
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
MISCONFIGURATIONS
Security misconfigurations are inaccurately
configured settings that leave an
organization’s IT infrastructure at risk. Some
of the misconfigurations include:
 Weak Passwords
 Public Access to SMB shared
 Outdated Protocols
 Word-writable file
08
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
IT ASSET
EXPOSURES
IT asset exposures comprises of the risks in
the IT infrastructure. Presence of any
malicious or shadow IT in the network will
lead to huge security mishaps. A few
examples of IT asset exposures:
 End of Life/ End of Support Software
 Untrusted Executables
 Unwanted Software
 Exposed Device
09
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
MISSING CRITICAL
SECURITY PATCHES
Security patches are essential to update an
application or a system to fix a vulnerability
prevalent in them. Not patching them
continuously will lead to massive cyberattacks
like WannaCry.
010
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
SECURITY CONTROL
DEVIATIONS &
ANOMALIES
Deviations or anomalies in crucial security
controls might open door for numerous
cyberattacks. A few of the security control
deviations include:
• Enabled IP Forwarding
• Disabled Firewall
• Non functioning Antivirus
• Lack of Device Encryption
011
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
HUMAN
WEAKNESSES
Humans are biggest attack vector in any IT
network. The recent CISO breach where an
attacker gain unauthorized access through an
employee’s personal vault is the biggest
example of humans as weak links.
012
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
ATTACK SURFACE MANAGEMENT
OVERVIEW OF ORGANIZATIONS ATTACK SURFACE
Enterprise computing
infrastructure
Perimeter-less
personal device
Utilized software
services
Cloud infrastructure
 Applications running on cloud
infrastructure
 Data storage
External exposed
assets
13
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
ADVANCED
VULNERABILITY
MANAGEMENT
FRAMEWORK
Gain Visibility into IT
Infrastructure
REPORT
VISIBILITY IDENTIFY
ASSESS
REMEDIATE PRIORITIZE
Vulnerabilities Misconfigurations Missing Patches Other Security
Risk Exposures
Assess security
risk from single
console and
insightful reports
Prioritise
vulnerabilities and
missing patches
based on severity
Patch
Vulnerabilities
Fix
Misconfigurations
Apply Security Controls
• Manage Vulnerabilities &
Security Risks Beyond CVEs
• Mitigate Vulnerabilities
On-time with Integrated
Remediation Controls
• Execute everything from a
truly integrated,
centralized console
• Automate end-to-end
tasks and establish a
continuous routine
Perform strategic
analysis with
insightful and
customizable
reports
Centralised
Management Console
APIs
APIs
For inquiries, contact us at: Email: info@secpod.com
WWW.SECPOD.COM
PREVENT CYBER ATTACKS.
CONTINUOUS. AUTOMATED.
TRY SANERNOW FREE

More Related Content

PDF
Uncover Vulnerabilities Beyond Software Vulnerabilities
PPTX
Gestiona el riesgo de las grandes amenazas
PDF
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PPTX
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
PDF
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
PPTX
Annual Vulnerability Report Insights - 2022
PPTX
Mind the gap_cpx2022_moti_sagey_final
Uncover Vulnerabilities Beyond Software Vulnerabilities
Gestiona el riesgo de las grandes amenazas
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Annual Vulnerability Report Insights - 2022
Mind the gap_cpx2022_moti_sagey_final

Similar to Uncovering Vulnerabilities Beyond Software Vulnerabilities (20)

PPTX
How to Implement Organization Wide Cyber Hygiene?
PDF
Prisma Cloud - CyberTech ID Forum 24.pdf
PDF
Seven Deadly Threats and Vulnerabilities in Cloud Computing
PDF
Seven deadly threats and vulnerabilities in cloud
PPTX
How to securely manage endpoints using SanerNow
PPTX
Cyber security event
PPTX
Network Security - Real and Present Dangers
PPTX
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
PDF
Ochrana pred modernými malware útokmi
PPTX
Segurdad de red para la generacion de la nube symantec
PDF
MT82 IoT Security Starts at Edge
PPTX
Why_IoT_Security_Matters_in_2025_and_Beyond.pptx
PPTX
Key Resources - z/Assure Sales Presentation
PPTX
Best Practices for Cloud-Based IoT Security
PDF
File-Based Deception Technology for Impeding Malicious Users
PDF
01_Metasploit - The Elixir of Network Security
PPTX
Top 5 predictions webinar
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PPTX
Three Networks, Different Risks - IT, OT and Engineering
PDF
PLEASE HERE THE BEST NOTE THAT I HAVE FINDOUT FOR THE CONCEPT OF THE NETW...
How to Implement Organization Wide Cyber Hygiene?
Prisma Cloud - CyberTech ID Forum 24.pdf
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven deadly threats and vulnerabilities in cloud
How to securely manage endpoints using SanerNow
Cyber security event
Network Security - Real and Present Dangers
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
Ochrana pred modernými malware útokmi
Segurdad de red para la generacion de la nube symantec
MT82 IoT Security Starts at Edge
Why_IoT_Security_Matters_in_2025_and_Beyond.pptx
Key Resources - z/Assure Sales Presentation
Best Practices for Cloud-Based IoT Security
File-Based Deception Technology for Impeding Malicious Users
01_Metasploit - The Elixir of Network Security
Top 5 predictions webinar
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Three Networks, Different Risks - IT, OT and Engineering
PLEASE HERE THE BEST NOTE THAT I HAVE FINDOUT FOR THE CONCEPT OF THE NETW...
Ad

More from SecPod (13)

PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PPTX
Align Your ITSM and SecOps Strategy for Unstoppable IT
PPTX
How can SMEs combat cyberattacks through automated vulnerability management?
PPTX
Security automation architecture principles for effective vulnerability manag...
PPTX
How to Achieve NIST Compliance using SanerNow?
PPTX
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
PPTX
How to effectively monitor and manage IT assets in real-time using SanerNow
PPTX
How to implement security compliance with SanerNow
PPTX
The Art of Managing and Securing Endpoints with SanerNow Patch Management
PPTX
The Art of Managing and Securing Endpoints
PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Cybersecurity Strategies for Effective Attack Surface Reduction
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Align Your ITSM and SecOps Strategy for Unstoppable IT
How can SMEs combat cyberattacks through automated vulnerability management?
Security automation architecture principles for effective vulnerability manag...
How to Achieve NIST Compliance using SanerNow?
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How to effectively monitor and manage IT assets in real-time using SanerNow
How to implement security compliance with SanerNow
The Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints
Cybersecurity Strategies for Effective Attack Surface Reduction
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Ad

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
“AI and Expert System Decision Support & Business Intelligence Systems”

Uncovering Vulnerabilities Beyond Software Vulnerabilities

  • 2. WHAT IS A VULNERABILITY? 02 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Vulnerability is a security loophole that can be exploited by cybercriminals to gain unauthorized access to the network. However, CVEs or Software Vulnerabilities are only considered as vulnerability leaving behind the other security loopholes. Are managing only CVEs or Software vulnerabilities sufficient to prevent Cyber Attacks?
  • 3. 03 Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Logon AutoStart Untrusted Apps Hardcoded secrets in PowerShell Script Misconfigured Account Privileges DNS Cache Poisoning Exposed Assets and Data Sources Poisoned Software Packages Bypassing Security Controls WHAT ARE ATTACKERS EXPLOITING TODAY? Exposed Network Shares Run or Start up Programs VPN Software Sensitive Information in Logs & Scripts
  • 4. 04 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY MITRE ATTACK TECHNIQUES  Logon AutoStart Execution  DNS/DHCP Spoofing  Start-up Folders  Kernel Modules & Extension  Logon Scripts  Browser bookmark discovery/ Extensions  Password Guessing  Clipboard data  Cloud discovery services  Command & Script Interpreters/ PowerShell  Python/ VB Scripts/JavaScript  Web Services/ Cloud Services  Network Share drives  Digital Certificates  File & Directory permissions
  • 5. DIFFERENT TYPES OF VULNERABILITIES IN AN ATTACK SURFACE 05 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 6. 06 Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY SOFTWARE VULNERABILITIES Software vulnerability is a defect in a software that could allow an attacker to gain unauthorized access to the network. Some of the popular software vulnerabilities include:  Apache Webserver  Log4J  Exchange Servers  Spring4shell
  • 7. 07 Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY MISCONFIGURATIONS Security misconfigurations are inaccurately configured settings that leave an organization’s IT infrastructure at risk. Some of the misconfigurations include:  Weak Passwords  Public Access to SMB shared  Outdated Protocols  Word-writable file
  • 8. 08 Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY IT ASSET EXPOSURES IT asset exposures comprises of the risks in the IT infrastructure. Presence of any malicious or shadow IT in the network will lead to huge security mishaps. A few examples of IT asset exposures:  End of Life/ End of Support Software  Untrusted Executables  Unwanted Software  Exposed Device
  • 9. 09 Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY MISSING CRITICAL SECURITY PATCHES Security patches are essential to update an application or a system to fix a vulnerability prevalent in them. Not patching them continuously will lead to massive cyberattacks like WannaCry.
  • 10. 010 Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY SECURITY CONTROL DEVIATIONS & ANOMALIES Deviations or anomalies in crucial security controls might open door for numerous cyberattacks. A few of the security control deviations include: • Enabled IP Forwarding • Disabled Firewall • Non functioning Antivirus • Lack of Device Encryption
  • 11. 011 Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY HUMAN WEAKNESSES Humans are biggest attack vector in any IT network. The recent CISO breach where an attacker gain unauthorized access through an employee’s personal vault is the biggest example of humans as weak links.
  • 12. 012 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY ATTACK SURFACE MANAGEMENT OVERVIEW OF ORGANIZATIONS ATTACK SURFACE Enterprise computing infrastructure Perimeter-less personal device Utilized software services Cloud infrastructure  Applications running on cloud infrastructure  Data storage External exposed assets
  • 13. 13 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY ADVANCED VULNERABILITY MANAGEMENT FRAMEWORK Gain Visibility into IT Infrastructure REPORT VISIBILITY IDENTIFY ASSESS REMEDIATE PRIORITIZE Vulnerabilities Misconfigurations Missing Patches Other Security Risk Exposures Assess security risk from single console and insightful reports Prioritise vulnerabilities and missing patches based on severity Patch Vulnerabilities Fix Misconfigurations Apply Security Controls • Manage Vulnerabilities & Security Risks Beyond CVEs • Mitigate Vulnerabilities On-time with Integrated Remediation Controls • Execute everything from a truly integrated, centralized console • Automate end-to-end tasks and establish a continuous routine Perform strategic analysis with insightful and customizable reports Centralised Management Console APIs APIs
  • 14. For inquiries, contact us at: Email: info@secpod.com WWW.SECPOD.COM PREVENT CYBER ATTACKS. CONTINUOUS. AUTOMATED. TRY SANERNOW FREE