<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Blogs on Hexiosec</title>
    <link>https://hexiosec.com/blog/</link>
    <description>Recent content in Blogs on Hexiosec</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <lastBuildDate>Wed, 30 Dec 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexiosec.com/blog/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>New ASM Features and Improvements | February 2026</title>
      <link>https://hexiosec.com/blog/asm-february-2026-update/</link>
      <pubDate>Thu, 26 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asm-february-2026-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;February may only be a short month, but the team have still managed to release lots of new features and improvements to Hexiosec ASM.&lt;/p&gt;
&lt;p&gt;This month&amp;rsquo;s new Hexiosec ASM features and improvements include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A new Web Presence report.&lt;/li&gt;
&lt;li&gt;The ability to create and manage API keys in the app.&lt;/li&gt;
&lt;li&gt;A series of improvements that make the app, and your data, easier to navigate.&lt;/li&gt;
&lt;li&gt;A cross-scan dashboard, currently in beta.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;web-presence-report&#34;&gt;Web Presence report&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;ve added a new report type to Hexiosec ASM. Web presence is a great way to visualise everything you have exposed online, and shows you what a user would see if they browsed to every URL identified on your attack surface.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Compliance Roadmap: End-to-End Encrypted File Transfer for UK Higher Education</title>
      <link>https://hexiosec.com/blog/compliance-e2ee-transfer-higher-education/</link>
      <pubDate>Tue, 10 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/compliance-e2ee-transfer-higher-education/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;As we explored in our previous article on &lt;a href=&#34;https://hexiosec.com/blog/he-regulations-secure-transfer/&#34;&gt;the regulatory landscape for UK higher education data protection&lt;/a&gt;, institutions face unprecedented challenges in securing sensitive information while maintaining operational effectiveness. With cyber security threats escalating and regulatory requirements becoming increasingly stringent, higher education institutions need solutions that specifically address their unique needs within the UK&amp;rsquo;s regulatory framework.&lt;/p&gt;
&lt;h2 id=&#34;6-steps-to-compliance&#34;&gt;6 Steps to Compliance&lt;/h2&gt;
&lt;p&gt;A strong compliance posture starts with:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Data classification&lt;/strong&gt; - Identify what needs protecting; a good question to ask is what would happen if this data were lost or stolen? This might include personally identifiable information (PII)  covered by UK GDPR, valuable research data, or commercially sensitive information.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Risk Assessment&lt;/strong&gt; – Understand the threats to sensitive data, ask questions such as:
&lt;ul&gt;
&lt;li&gt;Who would be interested in stealing your data and why?&lt;/li&gt;
&lt;li&gt;What could disrupt or corrupt your data?&lt;/li&gt;
&lt;li&gt;How could the data be lost – what access points are there?&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Policy Development&lt;/strong&gt; - Define how and when data is shared by establishing clear guidelines for what types of data must be shared through secure channels and align with the &lt;a href=&#34;https://www.ncsc.gov.uk/section/education-skills/cyber-security-heis-feis&#34; target=&#34;_blank&#34;&gt;NCSC&amp;rsquo;s guidance for higher education &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt; [1].&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Technical Deployment&lt;/strong&gt; - Roll out a solution that makes it easier for users to adhere to the policies you’ve defined, than to ignore them. Integrating with existing security frameworks and aligning with broader institutional security policies will reduce friction for users.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Training and Awareness&lt;/strong&gt; – Ensure staff understand both how to use the solution and why specific security measures are necessary. The ease of use should be emphasised to encourage adoption.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ongoing Monitoring&lt;/strong&gt; – Establish oversight processes to ensure consistent use of the solution and to identify any emerging compliance risks. A strong technical deployment stage should make light work of continuous monitoring.
The implementation process should prioritise departments handling the most sensitive data while establishing a roadmap for institution-wide adoption.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;how-secure-file-transfer-solutions-support-the-road-to-compliance&#34;&gt;How Secure File Transfer Solutions Support the Road to Compliance&lt;/h2&gt;
&lt;p&gt;For higher education and research institutions, securely sharing large files is essential for effective collaboration. This is especially important during the Policy Development and Technical Deployment phases of the Compliance Roadmap.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How End-to-End Encrypted Data Transfer Can Help UK Higher Education Navigate Data Regulations</title>
      <link>https://hexiosec.com/blog/he-regulations-secure-transfer/</link>
      <pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/he-regulations-secure-transfer/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;This blog explores the unique regulatory challenges facing UK higher education institutions and how end-to-end encrypted file transfer solutions can address these concerns while enabling secure, compliant data sharing.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The UK higher education sector faces an increasingly complex regulatory landscape when it comes to data protection and information security. With universities handling vast amounts of sensitive data—from groundbreaking research to high volumes of personally-identifiable information (PII)—the stakes for resilient data security have never been higher. The education sector remains a prime target for cyber-attacks, with higher education institutions experiencing security breaches at an alarming rate.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Securing the Academic Perimeter: Attack Surface Management in UK Higher Education</title>
      <link>https://hexiosec.com/blog/hexiosec-asm-for-higher-education/</link>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/hexiosec-asm-for-higher-education/</guid>
      <description>&lt;p&gt;Our previous blog explored the 
&lt;a href=&#34;https://hexiosec.com/blog/attack-surface-higher-education&#34; class=&#34;asm&#34; &gt;rapidly evolving cyber security landscape faced by UK higher education institutions&lt;/a&gt; and the unique challenges of managing their digital footprint. This blog explores what can be done to reduce these challenges and provides tips on how to stay ahead in an unpredictable and ever-changing world.&lt;/p&gt;
&lt;h2 id=&#34;the-higher-education-security-challenge&#34;&gt;The Higher Education Security Challenge&lt;/h2&gt;
&lt;p&gt;UK universities and colleges operate in a particularly challenging security environment. Their networks must balance openness for academic collaboration whilst protecting sensitive research data and student information. Many institutions struggle with:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Evolving Attack Surface in UK Higher Education</title>
      <link>https://hexiosec.com/blog/attack-surface-higher-education/</link>
      <pubDate>Thu, 05 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/attack-surface-higher-education/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;This blog explores how the attack surface in UK higher education has evolved, the unique challenges faced by the sector, and why comprehensive attack surface management has become essential for protecting these vital institutions.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;UK higher education institutions have become prime targets for cyber attackers over the past several years. With their vast digital estates, valuable intellectual property, and often fragmented security controls, universities and colleges present an attractive and vulnerable target landscape. The &lt;a href=&#34;https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025/cyber-security-breaches-survey-2025-education-institutions-findings&#34; target=&#34;_blank&#34;&gt;2025 DSIT Cyber Security Breaches survey &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt; highlighted this point, reporting that 91% of higher education institutions identified a breach or attack in the past year. [1]&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | January 2026</title>
      <link>https://hexiosec.com/blog/asm-january-2026-update/</link>
      <pubDate>Mon, 02 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asm-january-2026-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;January — the month when things are supposed to calm down after the Christmas hustle and bustle? Not for us.&lt;/p&gt;
&lt;p&gt;Alongside &lt;a href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&amp;rsquo;s&lt;/a&gt; new features we’re excited to share this month, we’ve also welcomed a film crew into the office for a behind-the-scenes look at Hexiosec. Stay tuned for upcoming videos where you’ll get insights into our environment and meet members of the team, including our Engineering Team Lead, Lauren Palmer.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Parsing email files in Go</title>
      <link>https://hexiosec.com/blog/parsing-email-files-in-go/</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/parsing-email-files-in-go/</guid>
      <description>&lt;p&gt;&lt;strong&gt;This blog provides some background on the format of two common email file types, and introduces Go modules for the parsing of both. We&amp;rsquo;ve used the modules to build a tool for inspecting suspicious email files.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;inspecting-suspicious-emails&#34;&gt;Inspecting Suspicious Emails&lt;/h2&gt;
&lt;p&gt;We have various customers who come to us with a range of questions and problems. A fairly common one is &amp;ldquo;I&amp;rsquo;ve got this email and I&amp;rsquo;m not sure about it&amp;rdquo;. We previously wrote a short guide on &lt;a href=&#34;https://hexiosec.com/blog/inspect-suspicious-emails&#34;&gt;manually inspecting emails&lt;/a&gt;, in an effort to help people help themselves. But in some cases we carry out our own checks; so we built a tool to inspect email files.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How to control Microsoft 365&#39;s AI features</title>
      <link>https://hexiosec.com/blog/nopilot/</link>
      <pubDate>Thu, 15 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/nopilot/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Every technology company is putting AI into everything, and whatever your opinions whether they should, it is unarguably going to have an impact on security. Focussing on Microsoft 365, this blog covers how you can use Intune to configure what Copilot and Recall are doing on managed Windows computers.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;I&amp;rsquo;m not going to add to the litany of blogs that discuss the merits of LLM-based applications in the workplace. In this context it doesn&amp;rsquo;t matter, as what is clear is that they are appearing in everything. Often without an administrator process to enable or configure them, which is clearly a potential threat to both security and privacy.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Checks for Email Configuration in Hexiosec ASM  | January 2026</title>
      <link>https://hexiosec.com/blog/mta-sts-on-asm/</link>
      <pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/mta-sts-on-asm/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;We’ve added a new layer of insight to your Hexiosec ASM scans: &lt;strong&gt;MTA-STS validation&lt;/strong&gt;. This protocol helps secure email delivery by enforcing TLS, reducing the risk of downgrade attacks. It’s an important part of having a strong email security posture, and in this post we’ll explain why it matters.&lt;/p&gt;
&lt;p&gt;When you run a scan of a domain, Hexiosec ASM already has a &lt;strong&gt;Mail Configuration&lt;/strong&gt; check that ensures that anti-spoofing measures are configured correctly. We check for:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Driving Cyber Security Forward: Hexiosec’s 2025 Highlights and What’s Next </title>
      <link>https://hexiosec.com/blog/hexiosec-2025-wrap-up/</link>
      <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/hexiosec-2025-wrap-up/</guid>
      <description>&lt;p&gt;As 2025 comes to a close, we’re proud to look back on a year of innovation, collaboration, and progress. At Hexiosec, we always want to help organisations stay secure in an ever-changing digital landscape, and this year we’ve taken big steps forward.&lt;/p&gt;
&lt;h2 id=&#34;advancing-cyber-security-through-shared-innovation&#34;&gt;Advancing cyber security through shared innovation&lt;/h2&gt;
&lt;p&gt;We’ve been privileged to contribute to initiatives that strengthen cyber security across the UK. Here are just a few of the highlights:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | November 2025</title>
      <link>https://hexiosec.com/blog/asm-november-2025-update/</link>
      <pubDate>Fri, 05 Dec 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asm-november-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With the festive season now upon us, our Hexmas elves have been at it again putting together another bumper packed stocking full of improvements to the Hexiosec ASM platform, ready for you to merrily unwrap, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A cloud connector to ensure complete coverage of your latest cloud assets in Hexiosec ASM.&lt;/li&gt;
&lt;li&gt;Details about who sent an invite to join your organisation, and when.&lt;/li&gt;
&lt;li&gt;Information about when services were last observed.&lt;/li&gt;
&lt;li&gt;Clarification about when services and components you remove will disappear from your scan results in future scans.&lt;/li&gt;
&lt;li&gt;Better visibility of scan usage across an organisation&amp;rsquo;s scan groups for admins.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition to these improvements, there have also been exciting developments over on ASM&amp;rsquo;s sibling product Hexiosec Transfer, taking the secure transfer of sensitive data to the next level, you can read about these upcoming features &lt;a href=&#34;https://hexiosec.com/blog/transfer-new-features/&#34;&gt;in our recent blog&lt;/a&gt;. Take a look and discover additional ways you can enhance the layers of security around your organisation, with &lt;a href=&#34;https://hexiosec.com/transfer/&#34;&gt;Hexiosec Transfer&lt;/a&gt; to help secure your day-to-day operations alongside &lt;a href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; to understand your online perimeter and the associated risks found.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Improving Email Security Even Further with MTA-STS</title>
      <link>https://hexiosec.com/blog/email-security-mta-sts/</link>
      <pubDate>Wed, 03 Dec 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/email-security-mta-sts/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Three years ago &lt;a href=&#34;https://hexiosec.com/blog/email-security/&#34;&gt;we wrote about&lt;/a&gt; implementing SPF, DKIM and DMARC for email security. This short blog details another email security protection - MTA-STS.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;SPF, DKIM and DMARC all affect the reliability of emails you send and receive, and can help to prevent spam and phishing. MTA-STS is a little different, as it helps control the communication between email servers. Specifically, the enforcement of TLS encryption. As per the relevant internet standard RFC:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Coming Soon - Introducing Three New Ways to Share Data Securely with Hexiosec Transfer</title>
      <link>https://hexiosec.com/blog/transfer-new-features/</link>
      <pubDate>Wed, 26 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/transfer-new-features/</guid>
      <description>&lt;p&gt;Over the next few months there are big changes coming to Hexiosec Transfer. As our first product to market, Hexiosec Transfer is something we are all extremely proud of; it is secure by design, with true end-to-end encryption at its heart, balanced with a simple user experience that&amp;rsquo;s easy to adopt.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;re now expanding its capabilities beyond the peer-to-peer sharing that it focuses on today, to support many more real world scenarios. Our ultimate goal is to help organisations always share sensitive information securely.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Turning Cyber Risk Into An Easy Boardroom Conversation Using NCSC’s CAF 4.0 and Hexiosec ASM</title>
      <link>https://hexiosec.com/blog/caf4-asm/</link>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/caf4-asm/</guid>
      <description>&lt;p&gt;The UK’s National Cyber Security Centre (NCSC) has developed the &lt;a href=&#34;https://www.ncsc.gov.uk/files/NCSC-Cyber-Assessment-Framework-4.0.pdf&#34; target=&#34;_blank&#34;&gt;Cyber Assessment Framework (CAF) 4.0 &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt; to help organisations systematically manage and strengthen their cyber resilience.&lt;/p&gt;
&lt;p&gt;But how does this help your organisation turn risk into an easy boardroom conversation, minimise costs and justify budgets?&lt;/p&gt;
&lt;p&gt;Rob Wright explains how using the CAF with Hexiosec ASM can help…&lt;/p&gt;
&lt;h2 id=&#34;introduction-the-critical-role-of-the-cyber-assessment-framework-caf&#34;&gt;Introduction: The critical role of the Cyber Assessment Framework (CAF)&lt;/h2&gt;
&lt;p&gt;In today’s digital landscape, the consequences of cyber incidents can be severe. Organisations responsible for essential services face relentless threats that can disrupt operations, compromise sensitive data, and undermine public trust. Recognising these risks, NCSC has developed the CAF.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>As the NCSC Retires Web Check and Mail Check, Hexiosec Has Your Back</title>
      <link>https://hexiosec.com/blog/ncsc-retiring-mailcheck-webcheck/</link>
      <pubDate>Thu, 13 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/ncsc-retiring-mailcheck-webcheck/</guid>
      <description>&lt;section class=&#34;webinar-callout&#34; style=&#34;background-image: url(&#39;blog-header-image.webp&#39;);&#34;&gt;
  &lt;div class=&#34;webinar-callout__overlay&#34;&gt;
    &lt;div class=&#34;webinar-callout__content&#34;&gt;
      &lt;p class=&#34;webinar-callout__eyebrow&#34;&gt;Live Webinar&lt;/p&gt;
      &lt;h3 class=&#34;webinar-callout__title&#34;&gt;The NCSC’s Web Check &amp;amp; Mail Check Are Retiring - Are You Ready?&lt;/h3&gt;
      &lt;p class=&#34;webinar-callout__copy&#34;&gt;Join us &lt;strong&gt;Thursday, 5 March, 10:00 am&lt;/strong&gt; to get practical advice on what to do, and what “good” looks like under the NCSC’s modern EASM model.&lt;/p&gt;
      &lt;a class=&#34;button primary smaller&#34; href=&#34;https://events.teams.microsoft.com/event/eb1ce20f-f205-465c-844b-ead37dc71652@70770b12-4332-43ab-a3c0-155d63432af7&#34; target=&#34;_blank&#34;&gt;Register for the webinar&lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;At the beginning of November the National Cyber Security Centre (NCSC) announced that &lt;strong&gt;Web Check&lt;/strong&gt; and &lt;strong&gt;Mail Check&lt;/strong&gt; – two components of the UK government’s Active Cyber Defence programme – &lt;a href=&#34;https://www.ncsc.gov.uk/blog-post/retiring-mail-check-web-check&#34; target=&#34;_blank&#34;&gt;will be decommissioned on 31 March 2026. &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Cyber Security Work Experience: Exploring AI in ASM at Hexiosec</title>
      <link>https://hexiosec.com/blog/summer-work-experience/</link>
      <pubDate>Tue, 11 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/summer-work-experience/</guid>
      <description>&lt;h2 id=&#34;a-week-in-cyber-security&#34;&gt;A week in Cyber Security&lt;/h2&gt;
&lt;p&gt;In late June Hexiosec had the pleasure of hosting Juliette as a work experience student. Fresh from finishing her GCSEs, Juliette was keen to find out about what goes on at a cyber security company. And we were keen to encourage her towards a future in engineering, which is the correct choice, in my correct opinion.&lt;/p&gt;
&lt;p&gt;From the outset we wanted to make sure Juliette had an engaging technical challenge, which would give her a genuine experience of working at Hexiosec. We chose a research topic for Juliette, aiming to both challenge her technically and provide useful insight for Hexiosec. Alongside the research we also made sure she met people from across the company, to allow her to find out about all the different roles and opportunities at a company like ours, such as marketing, services, product management, etc.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Minimising the Blast Radius - Why Secure File Sharing Is Critical</title>
      <link>https://hexiosec.com/blog/minimising-blast-radius/</link>
      <pubDate>Tue, 11 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/minimising-blast-radius/</guid>
      <description>&lt;h2 id=&#34;minimising-the-blast-radius-why-secure-file-sharing-is-critical&#34;&gt;Minimising the Blast Radius: Why Secure File Sharing Is Critical&lt;/h2&gt;
&lt;p&gt;Organisations routinely share sensitive information electronically, including with external partners and clients. Many organisations also need to work with contractors and suppliers, such as someone who has temporarily joined the organisation and is working alongside you or an external organisation with whom you are collaborating.&lt;/p&gt;
&lt;p&gt;People need to share documents easily to collaborate effectively and avoid delays or drops in productivity. The temptation is to use normal email, but when sending sensitive information, it can end up in the wrong hands. You may then be liable for fines – as seen with Capita’s recent £14 million GDPR fine – or suffer the business impact of others accessing confidential company information.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Cyber Security for Small to Medium Enterprises</title>
      <link>https://hexiosec.com/blog/cyber-for-smes/</link>
      <pubDate>Mon, 10 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/cyber-for-smes/</guid>
      <description>&lt;p&gt;Earlier in the year we were invited to talk at an event hosted at UKAS, and organised by them and Red Swan Partners. It was a cyber security event aimed at the Testing, Inspection, Certification and Compliance (TICC) sector, and I talked about cyber security for small to medium-sized enterprises.&lt;/p&gt;
&lt;p&gt;As it&amp;rsquo;s an interesting topic that&amp;rsquo;s relevant to lots of our customers, I thought I&amp;rsquo;d turn the talk into a blog post you can reference, along with a downloadable PDF that covers it in full detail.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | October 2025</title>
      <link>https://hexiosec.com/blog/asm-october-2025-update/</link>
      <pubDate>Thu, 06 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asm-october-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In October we continued the theme of the last couple of months by adding more features to help you view and manage risks discovered by Hexiosec Attack Surface Management (ASM). This month I&amp;rsquo;ll cover:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Created and resolved dates added to the Risks &amp;amp; Actions report&lt;/li&gt;
&lt;li&gt;Made the &amp;lsquo;Created At&amp;rsquo; field default for risks and actions&lt;/li&gt;
&lt;li&gt;Update to the in-scan sidebar for Risk Management&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Read on to hear about all this, as well as what else we have coming soon. The team are working on some major new features to perform more checks against your attack surface as well as cloud integrations with our cloud connectors.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Understanding True End‑to‑End Encryption: Why It Matters and How Hexiosec Transfer Does It Right</title>
      <link>https://hexiosec.com/blog/what-is-end-to-end-encryption/</link>
      <pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/what-is-end-to-end-encryption/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Some platforms claim end-to-end encryption, but few deliver it.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This blog explores what end‑to‑end encryption really means, why it matters, where some services fall short, and how &lt;a href=&#34;https://hexiosec.com/transfer&#34;&gt;Hexiosec Transfer&lt;/a&gt; achieves it by design.&lt;/p&gt;
&lt;p&gt;Many online tools strive to make it easy to share files and data, but this often comes at the expense of privacy; we routinely entrust providers with our confidential documents, assuming they will keep them safe.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;End‑to‑end encryption (E2EE)&lt;/strong&gt; has emerged as the gold standard for protecting these exchanges, but there are misconceptions around what E2EE means, and an increasing prevalence of tools that claim E2EE but which do not deliver on that promise.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | September 2025</title>
      <link>https://hexiosec.com/blog/asm-september-2025-update/</link>
      <pubDate>Tue, 30 Sep 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asm-september-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s everyone&amp;rsquo;s favourite day of the month, Hexiosec ASM monthly blog day. Yet another example of how we&amp;rsquo;re continuously making updates and improvements; a vital quality of an External Attack Surface Management product as noted by the National Cyber Security Centre in their recent &lt;a href=&#34;https://www.ncsc.gov.uk/guidance/external-attack-surface-management-buyers-guide&#34; target=&#34;_blank&#34;&gt;blog &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;You know the drill, here&amp;rsquo;s a summary of what we&amp;rsquo;ve been up to, read on for more details:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Exporting services to a CSV file&lt;/li&gt;
&lt;li&gt;EPSS data in Risks &amp;amp; Actions reports&lt;/li&gt;
&lt;li&gt;More information on IP Range seeds&lt;/li&gt;
&lt;li&gt;Link changes API endpoint&lt;/li&gt;
&lt;li&gt;Improved visibility of notable dates for actions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;exporting-services-as-a-csv&#34;&gt;Exporting services as a CSV&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;This feature is not available to all tiers, please contact us to discuss adding it to your account.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>What Is Attack Surface Management?</title>
      <link>https://hexiosec.com/blog/what-is-attack-surface-management/</link>
      <pubDate>Tue, 23 Sep 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/what-is-attack-surface-management/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Update:&lt;/strong&gt; The UK National Cyber Security Centre (NCSC) &lt;a href=&#34;https://www.ncsc.gov.uk/guidance/external-attack-surface-management-buyers-guide&#34; target=&#34;_blank&#34;&gt;has recently released guidance on External Attack Surface Management (EASM) tools&lt;/a&gt;. Hexiosec ASM was one of the products assessed, and we were pleased to contribute our expertise to this work. The guide provides useful advice for organisations considering or procuring an ASM solution.&lt;/p&gt;&lt;/blockquote&gt;
&lt;h2 id=&#34;managing-an-external-attack-surface&#34;&gt;Managing an External Attack Surface&lt;/h2&gt;
&lt;p&gt;In our previous blog on &lt;a href=&#34;https://hexiosec.com/blog/what-is-an-attack-surface/&#34;&gt;&amp;ldquo;What Is an Attack Surface?&amp;rdquo;&lt;/a&gt; we covered what we mean by an online attack surface. Knowing what makes up your attack surface is the sensible first step, but then you have to start keeping on top of it. In this follow-up we provide an overview of one approach to &lt;strong&gt;managing an attack surface.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | August 2025</title>
      <link>https://hexiosec.com/blog/asm-august-2025-update/</link>
      <pubDate>Wed, 03 Sep 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asm-august-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Reading a previous blog&amp;rsquo;s introduction, my partner made a wry comment about how surprising it was that the engineering team had been working hard again. I stand by this introduction, it is a fact that the team consistently work hard. This being August, and holiday season in the UK, some of the team have been on leave and therefore not working as much, but that&amp;rsquo;s allowed, and deserved.&lt;/p&gt;
&lt;p&gt;Regardless, the Hexiosec engineering team have had another month of significant features, in this blog we will cover:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Cutting through the noise: Prioritising Vulnerabilities with EPSS</title>
      <link>https://hexiosec.com/blog/epss-exploit-prediction-scoring/</link>
      <pubDate>Wed, 27 Aug 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/epss-exploit-prediction-scoring/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Security teams today are inundated with vulnerability data. A single scan can return hundreds of Common Vulnerabilities and Exposures (CVEs), each with its own severity score, technical details, and patching requirements. The challenge isn’t finding vulnerabilities; it’s knowing which ones to fix first.&lt;/p&gt;
&lt;p&gt;Traditionally, Common Vulnerability Scoring System (CVSS) scores have been used to sort vulnerabilities by severity. But while severity is useful in understanding potential impact, it doesn’t account for whether a vulnerability is actually being exploited - or likely to be in the near future.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>After The MoD Afghan Breach - From Breach to Best Practice Across Government</title>
      <link>https://hexiosec.com/blog/mod-data-breach-lessons/</link>
      <pubDate>Fri, 15 Aug 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/mod-data-breach-lessons/</guid>
      <description>&lt;p&gt;The recent breach at the Ministry of Defence is a stark reminder of the vulnerabilities that exist within government data handling. While the specifics are concerning, the underlying causes will be familiar to anyone working in public sector IT security.&lt;/p&gt;
&lt;h2 id=&#34;the-mod-breach-a--systemic-challenge&#34;&gt;The MoD breach: A  systemic challenge&lt;/h2&gt;
&lt;p&gt;A spreadsheet containing the personal details of almost 19,000 people &lt;a href=&#34;https://www.bbc.co.uk/news/articles/c79qyl907lxo&#34; target=&#34;_blank&#34;&gt;was accidentally leaked by an official at UK Special Forces headquarters. &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt; The document, intended for a restricted Afghan relocation team, was emailed outside the authorised group and later appeared in the public domain. Names from the list were even found on Facebook months later.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Content Security Policy Implementation Guide - Boarding Pass Required</title>
      <link>https://hexiosec.com/blog/csp-implementation-guide/</link>
      <pubDate>Fri, 08 Aug 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/csp-implementation-guide/</guid>
      <description>&lt;h2 id=&#34;content-security-policy-csp-implementation-guide-protecting-web-applications-from-xss-attacks&#34;&gt;Content Security Policy (CSP) Implementation guide: Protecting web applications from XSS attacks&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Looking to implement Content Security Policy for your website? This comprehensive CSP tutorial covers everything from basic CSP directives to advanced configuration examples, helping you secure your web applications against XSS attacks and other security threats.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Content Security Policy (CSP) is a powerful web security feature designed to prevent a wide range of cyber attacks, including Cross-Site Scripting (XSS), clickjacking, and data injection. It acts as a set of rules that tells the browser what content is allowed to be loaded, and how. By explicitly specifying trusted sources for scripts, styles, media, and other resources, CSP helps developers control the execution environment of their applications, limiting the risk of malicious content being injected and executed. As browsers become more security-conscious and attackers more sophisticated, learning how to implement CSP has become an essential skill.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | July 2025</title>
      <link>https://hexiosec.com/blog/july-2025-update/</link>
      <pubDate>Tue, 05 Aug 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/july-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The development team has been busy again this month, with a focus on how you assess risk and manage your seed data. Here’s a look at what’s new in Hexiosec ASM this July:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;EPSS scores &amp;amp; Risks&lt;/li&gt;
&lt;li&gt;Multi-seed imports&lt;/li&gt;
&lt;li&gt;Glance at next run date&lt;/li&gt;
&lt;li&gt;Additional filters for Risk graphs&lt;/li&gt;
&lt;li&gt;CSP changes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Additionally, I joined Hexiosec in July as a Junior Software Engineer! Although it&amp;rsquo;s only been a month I&amp;rsquo;ve contributed quite a few features in this blog 😊. Grateful for the team’s support, and excited for what’s ahead in Hexiosec ASM!&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>No Summer Holidays for Cyber Responders? Why Attackers Love the Summer, and Why the UK Education Sector Should Care</title>
      <link>https://hexiosec.com/blog/summer-holiday-challenges/</link>
      <pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/summer-holiday-challenges/</guid>
      <description>&lt;h2 id=&#34;the-problem-with-summer-holidays&#34;&gt;The problem with Summer Holidays&lt;/h2&gt;
&lt;p&gt;When it comes to cyber-attacks, timing is rarely accidental. And yet every summer, schools and universities are caught off guard; systems are breached, data is locked, plans are disrupted, right as staff begin to switch off. It’s a pattern that’s hard to ignore.
These aren’t just unfortunate coincidences. They’re calculated moves by attackers who understand when we’re most exposed, when the lights are on but no one’s watching. The summer break has quietly become peak season for targeting education.
The evidence is mounting, and the strategy is clear: hit hard when defences are thin, response times are slow, and the attack surface is quietly expanding in the background.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How We Tested Mobile App Privacy — and What We Found for Which?</title>
      <link>https://hexiosec.com/blog/testing-mobile-app-privacy-for-which/</link>
      <pubDate>Tue, 22 Jul 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/testing-mobile-app-privacy-for-which/</guid>
      <description>&lt;p&gt;&lt;strong&gt;This week sees the publication of some more research we&amp;rsquo;ve done with Which?, aka the Consumer&amp;rsquo;s Association. This blog provides some background, explains our approach and offers a few technical titbits.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;new-ico-guidance-raises-app-privacy-questions&#34;&gt;New ICO Guidance Raises App Privacy Questions&lt;/h2&gt;
&lt;p&gt;Last month the Information Commissioner’s Office released some &lt;a href=&#34;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/06/new-guidance-to-help-smart-product-manufacturers-get-data-protection-right/&#34;&gt;new draft guidance on privacy&lt;/a&gt; for &amp;ldquo;smart products&amp;rdquo;. Whilst it doesn&amp;rsquo;t explicitly mention apps, it does list a range of IoT products that are expected to be used alongside a companion app, so apps are certainly relevant. It&amp;rsquo;ll be interesting to watch what happens with it.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | June 2025</title>
      <link>https://hexiosec.com/blog/june-2025-update/</link>
      <pubDate>Wed, 02 Jul 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/june-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;June 2025 saw the Hexiosec development team continuing to work on new visualisations and checks in Hexiosec ASM, which we&amp;rsquo;ll be bringing to you soon. But the team has also released some great new features. Please read on to hear about a few of these, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Expandable description rows for risks&lt;/li&gt;
&lt;li&gt;Scan complete notifications for all scan types&lt;/li&gt;
&lt;li&gt;Support the use of Auth0 for SSO&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I will also introduce a change, coming in July, to how we describe the assets found by Hexiosec ASM.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Hidden Gem: How Flexible Working Kept Me in Tech</title>
      <link>https://hexiosec.com/blog/inwed-flexible-working/</link>
      <pubDate>Thu, 19 Jun 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/inwed-flexible-working/</guid>
      <description>&lt;p&gt;&lt;strong&gt;This time last year, I was making plans to leave the tech industry for good.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It may sound drastic, but the reason I wanted to walk away was also my reason for wanting to staying: I couldn’t see many (any?) people like me doing what I do (more on this later).&lt;/p&gt;
&lt;h2 id=&#34;spoiler-alert-i-stuck-around&#34;&gt;Spoiler alert: I stuck around&lt;/h2&gt;
&lt;p&gt;Trying to find a part-time job within cyber security was like looking for a diamond at the bottom of the ocean – I&amp;rsquo;d bet there is one somewhere that someone has lost at some point in time, but even getting eyes on it felt like an almost impossible task. Trying to find one without an on-call rotation, however, &lt;em&gt;did&lt;/em&gt; seem impossible (responding to an incident at 2am, having stolen 28 minutes of sleep after finally getting a little one down for the 11&lt;sup&gt;th&lt;/sup&gt; time that evening has its challenges).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>🦄 Being the Unicorn: Reflections for Women in Engineering Day</title>
      <link>https://hexiosec.com/blog/inwed-being-the-unicorn/</link>
      <pubDate>Wed, 18 Jun 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/inwed-being-the-unicorn/</guid>
      <description>&lt;p&gt;Hello, I’m Lauren — the Engineering Team Lead here at Hexiosec. For &lt;a href=&#34;https://www.inwed.org.uk/&#34; target=&#34;_blank&#34;&gt;International Women in Engineering Day &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt;, I wanted to share a few thoughts on what it’s like being the only woman on our engineering team.&lt;/p&gt;
&lt;h2 id=&#34;on-being-a-unicorn&#34;&gt;On Being a Unicorn&lt;/h2&gt;
&lt;p&gt;I often liken being a female engineer to being a unicorn — a mythical creature. Sometimes I feel like an oddity, a rarity. There’s plenty of discussion around encouraging women in STEM and bridging the diversity gap. And while I am fortunate that 25% of my workplace is female, I still often find myself the only woman in the room – especially when leading a team of men.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | May 2025</title>
      <link>https://hexiosec.com/blog/may-2025-update/</link>
      <pubDate>Mon, 09 Jun 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/may-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In May we&amp;rsquo;ve reacted quickly to agreements on certificate validity periods by refining the risks we raise against certificates with long validity periods, and we&amp;rsquo;ve added a brand new asset management page for services.&lt;/p&gt;
&lt;p&gt;In this month&amp;rsquo;s blog, we cover the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Changes to risks relating to TLS certificate validity periods&lt;/li&gt;
&lt;li&gt;A new Asset Management page for Services&lt;/li&gt;
&lt;li&gt;New in-app navigation options&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;tls-certificate-validity-period&#34;&gt;TLS certificate validity period&lt;/h2&gt;
&lt;p&gt;In May (the 13th to be precise), we updated risks relating to TLS certificate validity periods. It was previously anticipated that a 90 day validity period, recommended by Google, was likely to come into force. To allow organisations to prepare for this, Hexiosec ASM was highlighting certificates with a period longer than this. Based on recent agreements on this topic, the results found by Hexiosec ASM have now been updated to reflect these agreements, and help you resolve certificate risks.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Phishing with Malicious SVG Files</title>
      <link>https://hexiosec.com/blog/svg-phishing/</link>
      <pubDate>Fri, 06 Jun 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/svg-phishing/</guid>
      <description>&lt;h2 id=&#34;the-threat-of-svg-files&#34;&gt;The threat of SVG files&lt;/h2&gt;
&lt;p&gt;As recently covered by &lt;a href=&#34;https://risky.biz/risky-bulletin-svg-use-for-phishing-explodes-in-2025/&#34; target=&#34;_blank&#34;&gt;RiskyBiz &lt;i class=&#34;fa-sharp-duotone fa-solid fa-arrow-up-right-from-square&#34;&gt;&lt;/i&gt;&lt;/a&gt;, attackers sending phishing emails have suddenly discovered what can be done with attaching malicious SVG images. We saw this with a customer last week, so I thought it worth a quick blog.&lt;/p&gt;
&lt;p&gt;In our case, five of the more prominent users from one customer organisation all received similar emails, which purport to be a TODO message to themselves, with no body content but with an SVG attached:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | April 2025</title>
      <link>https://hexiosec.com/blog/april-2025-update/</link>
      <pubDate>Sat, 10 May 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/april-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Throughout April the engineering team were as busy as always, working on a range of updates to &lt;a href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, which include improvements to our web application, scan processing, system metrics and testing. To hear about a couple of the features we&amp;rsquo;ve released in the last month, as well as a couple of other topics, please read on:&lt;/p&gt;
&lt;p&gt;This month I will cover:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Updated risk change navigation&lt;/li&gt;
&lt;li&gt;An update to our CSP checks&lt;/li&gt;
&lt;li&gt;The impact of the CVE programme funding on Hexiosec ASM, or not&lt;/li&gt;
&lt;li&gt;An update to Hexiosec ASM&amp;rsquo;s sibling product, Hexiosec Transfer&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;navigating-risk-changes&#34;&gt;Navigating risk changes&lt;/h2&gt;
&lt;p&gt;When you&amp;rsquo;re reviewing your scan results and any changes, we want to make it as easy as possible for you to understand what&amp;rsquo;s changed. You may be reviewing historical changes or you may be reviewing the latest changes prompted by an email notification.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hexiosec Now on Jisc&#39;s Chest Platform</title>
      <link>https://hexiosec.com/blog/hexiosec-jisc-chest/</link>
      <pubDate>Wed, 07 May 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/hexiosec-jisc-chest/</guid>
      <description>&lt;h2 id=&#34;hexiosec-products-now-available-on-jiscs-chest-platform&#34;&gt;Hexiosec products now available on Jisc&amp;rsquo;s Chest platform&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Making cyber security simpler, stronger, and more accessible for UK education and research&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We’re excited to announce that Hexiosec is now available through the &lt;a href=&#34;https://www.chest.ac.uk/agreements/hexiosec-asm-and-transfer/&#34;&gt;Chest platform&lt;/a&gt; — the trusted software and services procurement service run by &lt;strong&gt;Jisc&lt;/strong&gt;, supporting universities, colleges, and research institutions across the UK.&lt;/p&gt;
&lt;p&gt;From today, &lt;a href=&#34;https://hexiosec.com/asm&#34;&gt;Hexiosec ASM&lt;/a&gt; and &lt;a href=&#34;https://hexiosec.com/transfer&#34;&gt;Hexiosec Transfer&lt;/a&gt; can be purchased directly through Chest, giving institutions a faster, more cost-effective way to strengthen their cyber security posture.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Transfer Feature | Secure Multi-Use File Sharing Requests</title>
      <link>https://hexiosec.com/blog/transfer-multi-use-requests/</link>
      <pubDate>Tue, 06 May 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/transfer-multi-use-requests/</guid>
      <description>&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;
      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/eJynQ2CscUY?autoplay=1&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=1&amp;amp;mute=1&amp;amp;playlist=eJynQ2CscUY&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;
    &lt;/div&gt;

&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://hexiosec.com/transfer/&#34;&gt;Hexiosec Transfer&lt;/a&gt; allows you to &lt;strong&gt;receive&lt;/strong&gt; files as well as send them, via our &lt;a href=&#34;https://hexiosec.com/transfer/end-to-end-encryption/&#34;&gt;Sharing Request&lt;/a&gt; feature. This creates a link you can share with someone, enabling them to securely transfer files back to you using our end-to-end encrypted transfer technology.&lt;/p&gt;
&lt;p&gt;Sharing Requests work using Public Key Cryptography to agree a secret encryption key with the recipient of your request link. This ensures your transfers remain private to just you, whilst keeping the experience smooth and low-friction for your customers. Files shared with you are accessible for up to 30 days and only by you.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | March 2025</title>
      <link>https://hexiosec.com/blog/march-2025-update/</link>
      <pubDate>Tue, 01 Apr 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/march-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;We have a number of updates to highlight for you this month, ranging from web component detections to user preference improvements.&lt;/p&gt;
&lt;p&gt;Read below for details on the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Detection of the Hunk companion Wordpress plugin&lt;/li&gt;
&lt;li&gt;Configurable user session timeouts (Enterprise)&lt;/li&gt;
&lt;li&gt;Improvements to user preferences navigation&lt;/li&gt;
&lt;li&gt;&amp;lsquo;Last active&amp;rsquo; data for organisation users&lt;/li&gt;
&lt;li&gt;End of scan actions link&lt;/li&gt;
&lt;li&gt;New options to control table data views&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;detection-of-the-hunk-companion-wordpress-plugin&#34;&gt;Detection of the Hunk Companion Wordpress plugin&lt;/h2&gt;
&lt;p&gt;In December 2024, a &lt;a href=&#34;https://arstechnica.com/security/2024/12/thousands-of-sites-remain-unpatched-against-actively-exploited-wordpress-plugin-bug/?utm_content=326563447&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-28138094&#34; target=&#34;_blank&#34;&gt;critical vulnerability&lt;/a&gt; was discovered for the Hunk Companion Wordpress plugin. It can be difficult to stay on top of the latest vulnerabilities, especially if you can&amp;rsquo;t monitor the latest cyber security news all the time. Thankfully ASM continuously monitors your public infrastructure for you, alerting you to new risks.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Fixing Golang SSH Authentication Issues in WSL with Git and Private Repos</title>
      <link>https://hexiosec.com/blog/go-git-ssh-madness/</link>
      <pubDate>Wed, 26 Mar 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/go-git-ssh-madness/</guid>
      <description>&lt;p&gt;&lt;strong&gt;This post highlights a few problems with the way the Golang - specifically the &lt;code&gt;go get&lt;/code&gt; command - works when using private repositories and SSH authentication, alongside the Windows Subsystem for Linux (WSL). This post goes into details of workarounds, as well as some security tips.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;tldr&#34;&gt;TL;DR&lt;/h2&gt;
&lt;p&gt;Here is a quick overview of the key points to make it all work nicely:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Set an environment variable &lt;code&gt;export GIT_SSH_COMMAND=&amp;quot;ssh.exe -i github.com&amp;quot;&lt;/code&gt; before using the &lt;code&gt;go get&lt;/code&gt; command, making sure to also have a SSH configuration file in place.&lt;/li&gt;
&lt;li&gt;Choose a SSH agent to deal with SSH keys with passphrases.&lt;/li&gt;
&lt;li&gt;Create a git rewrite rule to force SSH authentication instead of HTTP.&lt;/li&gt;
&lt;li&gt;Create an alias to SSH (&lt;code&gt;ssh.exe&lt;/code&gt;) inside WSL for general git activity.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;the-problems&#34;&gt;The Problem(s)&lt;/h2&gt;
&lt;p&gt;Well, there are actually a few I wanted to solve. The first is that the &lt;code&gt;go get&lt;/code&gt; command doesn&amp;rsquo;t respect your SSH git configuration, even if you set a &lt;code&gt;~/.gitconfig&lt;/code&gt; file for that repository, or globally. Both are ignored when trying to download a &lt;strong&gt;private&lt;/strong&gt; repo from GitHub, which is a problem for internal projects that rely on some private repos.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | February 2025</title>
      <link>https://hexiosec.com/blog/february-2025-update/</link>
      <pubDate>Wed, 05 Mar 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/february-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With Spring (meteorological) and the welcome appearance of snowdrops and daffodils almost here for those of us in the northern hemisphere, we have another blog to brighten your day (a little poetic license may be required).  We&amp;rsquo;re always working away on improvements behind the scenes, but here are a few changes visible in the user interface, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SSO for Microsoft Entra&lt;/li&gt;
&lt;li&gt;Ignoring multiple risks&lt;/li&gt;
&lt;li&gt;Resolved dates for actions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;entra-sso-for-enterprise-and-msp-plans&#34;&gt;Entra SSO for Enterprise and MSP plans&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;Since writing this blog we have added support for additional SSO providers, see our &lt;a href=&#34;https://docs.hexiosec.com/asm/which-sso-protocols-does-asm-support&#34;&gt;FAQ&lt;/a&gt; for more details.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Why You Should Stop Using Email Attachments (and What to Do Instead)</title>
      <link>https://hexiosec.com/blog/secure-email-attachments/</link>
      <pubDate>Wed, 19 Feb 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/secure-email-attachments/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;This article discusses the issues and risks associated with data transfer via email attachments and suggests improvements that organisations can make to help improve their cyber security.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;I will start this blog with the rather bold statement &lt;em&gt;&lt;strong&gt;‘We should all stop sending email attachments – right now!’&lt;/strong&gt;&lt;/em&gt;. Now, this is an overly generalised and slightly exaggerated statement, but behind it there are genuine reasons why businesses may want to establish mechanisms and encourage users to minimise the use of email attachments for information sharing – especially with recipients outside of their organisation.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How to Build a WireGuard VPN to Protect Cloud Administration</title>
      <link>https://hexiosec.com/blog/building-a-wireguard-vpn/</link>
      <pubDate>Tue, 18 Feb 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/building-a-wireguard-vpn/</guid>
      <description>&lt;p&gt;&lt;strong&gt;This blog covers how you can reduce your cloud administration attack surface using a Wireguard VPN in Google Cloud. In a following blog post we&amp;rsquo;ll build it with Terraform.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;A popular use of Virtual Private Networks (VPNs) is to provide additional privacy on the traffic leaving and entering a computer. That and &lt;a href=&#34;https://www.theregister.com/2025/01/05/pornhub_vpn_demand_surge/&#34;&gt;watching &amp;ldquo;video content&amp;rdquo; restricted to geographical regions&lt;/a&gt;. This article is about neither of these.&lt;/p&gt;
&lt;p&gt;One of the things we do at Hexiosec is build cloud infrastructure. Creating cloud infrastructure on the Internet means you need to manage it &lt;em&gt;also from the Internet&lt;/em&gt;. And this means private, privileged interfaces to your infrastructure are &lt;a href=&#34;https://www.shodan.io/explore/popular&#34;&gt;exposed to everyone else on the Internet&lt;/a&gt;. As the UK NCSC &lt;a href=&#34;https://www.ncsc.gov.uk/blog-post/protect-your-management-interfaces#:~:text=avoid%20exposing%20management%20interfaces&#34;&gt;recommends&lt;/a&gt;, avoiding exposing management interfaces reduces your &lt;a href=&#34;https://en.wikipedia.org/wiki/Attack_surface&#34;&gt;attack surface&lt;/a&gt;. One way this can be achieved is by only allowing connections to the management interfaces from a pre-determined list of IP addresses (enforced by the firewall/security rules). But this leaves us with the problem: &amp;lsquo;what if we don&amp;rsquo;t have a fixed IP to work from?&amp;rsquo;. This is what that this blog is about. We will build a locked down relay box with a fixed IP address that we securely route our traffic via where we&amp;rsquo;re working.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Power Of Attack Surface Management for Asset Discovery</title>
      <link>https://hexiosec.com/blog/asset-discovery/</link>
      <pubDate>Wed, 05 Feb 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asset-discovery/</guid>
      <description>&lt;p&gt;This blog explains what we mean by online assets, why they can be difficult to manage, and how that could impact security. Most importantly, it explores how Hexiosec ASM helps organisations of all sizes discover and manage their online assets.&lt;/p&gt;
&lt;h2 id=&#34;what-are-online-assets&#34;&gt;What are online assets?&lt;/h2&gt;
&lt;p&gt;Simply put, online assets are resources directly connected to the Internet. For most companies, that means websites and cloud applications and services.&lt;/p&gt;
&lt;p&gt;On-premises servers and appliances often host services that are exposed to the Internet - especially VPNs, network appliances, or remote access services. Others are typically only accessible over a local network or an incoming VPN connection.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | January 2025</title>
      <link>https://hexiosec.com/blog/january-2025-update/</link>
      <pubDate>Thu, 30 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/january-2025-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;There are no January blues at Hexiosec, and certainly not where attack surface management (ASM) is concerned. We have plenty of new features to tell you about this month.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Read on.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;total-scan-size&#34;&gt;Total scan size&lt;/h2&gt;
&lt;p&gt;To help our MSP customers with clarifying the size and cost of their client&amp;rsquo;s scans, and indeed to help all our customers understand the size of each scan, there is now a new &lt;strong&gt;&amp;lsquo;Size&amp;rsquo;&lt;/strong&gt; value displayed at a few points in the app.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Power of Automated Asset Discovery Done Well</title>
      <link>https://hexiosec.com/blog/the-power-of-asset-discovery/</link>
      <pubDate>Mon, 13 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/the-power-of-asset-discovery/</guid>
      <description>&lt;h2 id=&#34;what-is-asset-discovery&#34;&gt;What is asset discovery?&lt;/h2&gt;
&lt;p&gt;In cyber security, &lt;a href=&#34;https://hexiosec.com/asm/asset-discovery/&#34;&gt;asset discovery&lt;/a&gt; is a foundational process of &lt;a href=&#34;https://hexiosec.com/blog/what-is-attack-surface-management/&#34;&gt;attack surface management (ASM)&lt;/a&gt;, also known as external attack surface management (EASM). Asset discovery involves identifying, enumerating and cataloguing all the devices, systems, and software that might be exposed to potential attack from the open internet.&lt;/p&gt;
&lt;p&gt;When asset discovery is further combined with the vulnerability detection and vulnerability assessment methods of attack surface management, it becomes truly powerful and allows an organisation to understand &lt;strong&gt;what&lt;/strong&gt; it needs to protect, &lt;strong&gt;where&lt;/strong&gt; vulnerabilities might exist, and &lt;strong&gt;how&lt;/strong&gt; to mitigate the risk of attacks from hackers exploiting those vulnerabilities.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | December 2024</title>
      <link>https://hexiosec.com/blog/december-2024-update/</link>
      <pubDate>Thu, 09 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/december-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Happy New Year, and welcome to 2025! We&amp;rsquo;ve already started planning the updates we&amp;rsquo;ll be bringing to Hexiosec ASM in the coming year, and we will have some exciting features to tell you about in the coming months, keep watching this blog for future updates.&lt;/p&gt;
&lt;p&gt;In the meantime, December 2024 updates included some changes you will already see in the app. We&amp;rsquo;ve:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;included a new asset management page to manage IPs in a scan&lt;/li&gt;
&lt;li&gt;made it easier to manage and navigate your organisation&amp;rsquo;s settings&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;new-ips-page-asset-management&#34;&gt;New IPs page (Asset Management)&lt;/h2&gt;
&lt;p&gt;To give you more ways to view scan data, such as components and services, we will be adding various new asset management pages to Hexiosec ASM. The first of these new pages is for IP addresses, and means that we have also added a new sidebar grouping for all app pages relating to Asset Management.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How To Prepare For a Safer Christmas</title>
      <link>https://hexiosec.com/blog/christmas-guide/</link>
      <pubDate>Wed, 11 Dec 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/christmas-guide/</guid>
      <description>&lt;h2 id=&#34;why-is-christmastime-a-target&#34;&gt;Why is Christmastime a target?&lt;/h2&gt;
&lt;p&gt;The holiday season is upon us; for many, it is a time for celebration and relaxation after a busy year. Unfortunately, it’s also prime time for cybercriminals.&lt;/p&gt;
&lt;p&gt;In December 2023, there was a &lt;a href=&#34;https://www.itgovernance.co.uk/blog/global-data-breaches-and-cyber-attacks-in-december-2023-2241916765-records-breached&#34;&gt;surge in cyber-attacks&lt;/a&gt;, with an increase of 187% for security-related incidents, and a staggering 332% increase in breached records. Cybercriminals are looking to take advantage as businesses wind down for the festive break.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | November 2024</title>
      <link>https://hexiosec.com/blog/november-2024-update/</link>
      <pubDate>Thu, 05 Dec 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/november-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With the festive season upon us, our Hexmas elves have been busy working on new features, merrily improving the system, and have readied a few treats for our ASM users to unwrap early:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A new credit-based system to manage scan allowances&lt;/li&gt;
&lt;li&gt;Added annotations for notable events on the scan timeline charts&lt;/li&gt;
&lt;li&gt;Improved identification of seed web presence, with click-through&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;scan-credits&#34;&gt;Scan credits&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;ve made some behind-the-scenes changes to how we manage scan allowances and automate monthly allocations. These, like &lt;a href=&#34;https://hexiosec.com/blog/may-2024-update/#better-visibility-of-rescan-allowances&#34; target=&#34;_blank&#34;&gt;rescan allowances&lt;/a&gt;, are now credits-based. This change won&amp;rsquo;t impact how ASM is used, or change any existing allowances, but users may notice a few subtle UI differences on the usage page and around the app.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Even Cheaper Private Kubernetes</title>
      <link>https://hexiosec.com/blog/even-cheaper-kubernetes/</link>
      <pubDate>Wed, 04 Dec 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/even-cheaper-kubernetes/</guid>
      <description>&lt;p&gt;&lt;strong&gt;In a
&lt;a href=&#34;https://hexiosec.com/blog/affordable-kubernetes-for-personal-projects/&#34;  &gt;previous blog&lt;/a&gt; we showed how to build a cheap Kubernetes project, avoiding some of the bigger costs involved in hosting a cluster. That blog got a lot of attention, so here is a much improved follow-up. In this blog I&amp;rsquo;ll show how to build an even cheaper and more secure Kubernetes cluster for small projects.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A few years ago now we published a concept for hosting Kubernetes on Google Cloud Platform for
&lt;a href=&#34;https://hexiosec.com/blog/affordable-kubernetes-for-personal-projects/#cost-of-the-cluster&#34;  &gt;less than £20 pcm&lt;/a&gt;.
It&amp;rsquo;s fair to say quite a lot has changed since then, but irrespective of resource price increases, a lot of providers still support a generous free tier to help you build up your own expertise in their product offering.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Testing Smart Device Privacy - Our Work for Which?</title>
      <link>https://hexiosec.com/blog/which-privacy/</link>
      <pubDate>Tue, 05 Nov 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/which-privacy/</guid>
      <description>&lt;p&gt;&lt;strong&gt;We worked with Which? (A.K.A The Consumers&amp;rsquo; Association) to look at how privacy is (or isn&amp;rsquo;t) implemented on common smart devices&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Today sees &lt;a href=&#34;https://www.which.co.uk/news/article/smart-device-brands-must-put-privacy-over-profits-at8Vq4t3VCn9&#34;&gt;the publication&lt;/a&gt; of the write-up of some research into the privacy of some smart devices that we completed in September alongside &lt;a href=&#34;https://www.which.co.uk/news/author/andrew-laughlin&#34;&gt;Andrew Laughlin&lt;/a&gt; at the Consumers&amp;rsquo; Assocation (aka Which?).&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve worked with Andrew and Which? over the years on various bits of security research, including on &lt;a href=&#34;https://hexiosec.com/blog/smish-smash/&#34;&gt;smishing&lt;/a&gt;, &lt;a href=&#34;https://hexiosec.com/blog/news-routers/&#34;&gt;routers&lt;/a&gt; and the &lt;a href=&#34;https://hexiosec.com/blog/which-banking-testing/&#34;&gt;online attack surfaces of banks&lt;/a&gt; and &lt;a href=&#34;https://hexiosec.com/blog/which-attack-surfaces/&#34;&gt;big organisations&lt;/a&gt;. Whilst this work was analogous to security testing, this time the we instead were chiefly concerned with user privacy.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | October 2024</title>
      <link>https://hexiosec.com/blog/october-2024-update/</link>
      <pubDate>Thu, 31 Oct 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/october-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The engineering team are working on some bigger features, and we will bring you updates on these when they are released. In the meantime we&amp;rsquo;ve got a couple of new UI features to highlight:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dark mode&lt;/li&gt;
&lt;li&gt;Seed searches&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition, we&amp;rsquo;ve got some new knowledge base articles to let you know about.&lt;/p&gt;
&lt;h2 id=&#34;dark-mode&#34;&gt;Dark mode&lt;/h2&gt;
&lt;p&gt;There are some never ending debates in IT and programming, tabs vs spaces, Vim vs Emacs, where to put your curly braces, AI vs If statements, all very important&amp;hellip; and dark mode vs light mode is one of those debates. Personally I like both, it depends on the time of day and lighting. As the nights draw in, and a certain day gets closer, one upside is that I&amp;rsquo;ll get to use the new dark mode setting in Hexiosec ASM.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | September 2024</title>
      <link>https://hexiosec.com/blog/september-2024-update/</link>
      <pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/september-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The obvious big update from us this month is our rebrand, and the aligning of our product and service offerings under one brand, Hexiosec. But, that isn&amp;rsquo;t to say we haven&amp;rsquo;t been busy improving the application, now called Hexiosec ASM (Attack Surface Management).&lt;/p&gt;
&lt;h2 id=&#34;rebrand&#34;&gt;Rebrand&lt;/h2&gt;
&lt;p&gt;Our CEO David has written a great blog on our rebrand, the reasons why and the tricky problem of trying to find a unique (and sensible) name. You can read his &lt;a href=&#34;https://hexiosec.com/blog/rebranding-to-hexiosec/&#34;&gt;blog here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>We&#39;ve Rebranded to Hexiosec</title>
      <link>https://hexiosec.com/blog/rebranding-to-hexiosec/</link>
      <pubDate>Mon, 30 Sep 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/rebranding-to-hexiosec/</guid>
      <description>&lt;h2 id=&#34;announcement-we-are-now-hexiosec&#34;&gt;Announcement: We are now &amp;lsquo;Hexiosec&amp;rsquo;&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;re very excited to announce that as of 30th Sept 2024 we have become &amp;lsquo;Hexiosec&amp;rsquo;.&lt;/p&gt;
&lt;h3 id=&#34;key-facts&#34;&gt;Key Facts&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Red Maple Technologies Limited&lt;/strong&gt; has changed name to &lt;strong&gt;Hexiosec Limited.&lt;/strong&gt; Note the legal entity remains the same - this is just a company renaming exercise.&lt;/p&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;a href=&#34;https://hexiosec.com/asm/&#34;&gt;&lt;strong&gt;FractalScan Surface&lt;/strong&gt;&lt;/a&gt; has become &lt;strong&gt;Hexiosec ASM&lt;/strong&gt;, or &lt;strong&gt;Hexiosec Attack Surface Management&lt;/strong&gt; in its longer form.&lt;/p&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;a href=&#34;https://hexiosec.com/transfer/&#34;&gt;&lt;strong&gt;Trebuchet&lt;/strong&gt;&lt;/a&gt;, our secure and private file transfer platform, has become &lt;strong&gt;Hexiosec Transfer&lt;/strong&gt; for our Enterprise customers, though will remain as the &lt;strong&gt;Trebuchet&lt;/strong&gt; for individuals.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | August 2024</title>
      <link>https://hexiosec.com/blog/august-2024-update/</link>
      <pubDate>Tue, 03 Sep 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/august-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;There is lots to share this month - read on to hear about some great features we&amp;rsquo;ve rolled out in the last month:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Handling for Apache backporting and associated risks&lt;/li&gt;
&lt;li&gt;Using the public API to generate and download reports&lt;/li&gt;
&lt;li&gt;Showing client-side redirects in the Web Presence page&lt;/li&gt;
&lt;li&gt;Highlighting certificates with an validity period of over 90 days&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;apache-backport-handling&#34;&gt;Apache backport handling&lt;/h2&gt;
&lt;p&gt;We pride ourselves with Hexiosec ASM that the attack surface results we produce are accurate and, despite the fact we operate in a passive manner, represents discovered infrastructure and risks very well. There will always be some challenging scenarios when determining risks, and Apache backports is one of those scenarios, but we now help you manage this.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Feature - Apache Backports Reporting</title>
      <link>https://hexiosec.com/blog/apache-backports/</link>
      <pubDate>Sat, 31 Aug 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/apache-backports/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;When building Hexiosec ASM, something we have always felt strongly about is ensuring we present accurate results, which also takes into account factors you can&amp;rsquo;t see on the surface. Some scenarios can be more challenging than others, especially if it becomes a choice between showing a potentially serious risk or not.&lt;/p&gt;
&lt;p&gt;Apache backports (see below) is one such scenario&amp;hellip; But we are excited to introduce a new feature in Hexiosec ASM that clearly highlights the impacted risks, and allows you to choose if these risks are included in your scans results.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | July 2024</title>
      <link>https://hexiosec.com/blog/july-2024-update/</link>
      <pubDate>Wed, 07 Aug 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/july-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;This month the engineering team have been busy updating our backend processing and data storage, as well as a number of improvements to your Hexiosec ASM experience. Read on to find out more.&lt;/p&gt;
&lt;h2 id=&#34;system-improvements---weekend-maintenance&#34;&gt;System improvements - weekend maintenance&lt;/h2&gt;
&lt;p&gt;You may have noticed that we scheduled a period of maintenance for Hexiosec ASM over the weekend of the 20-21 July. This was to enable us to update our system and make some changes in how we processes and store Hexiosec ASM data. The updates have resulted in some immediate improvements to scan times as well as overall performance benefits in the app.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | June 2024</title>
      <link>https://hexiosec.com/blog/june-2024-update/</link>
      <pubDate>Fri, 28 Jun 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/june-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;This month we&amp;rsquo;ve added improvements to &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, to help you gain more insights into scan results, and to check the security of your own Hexiosec ASM users.&lt;/p&gt;
&lt;p&gt;In this blog we&amp;rsquo;ll describe how you can now see which of your Hexiosec ASM user accounts have MFA enabled, and how an update to the certificates widget allows you to list which certificates have expired.&lt;/p&gt;
&lt;h2 id=&#34;visibility-of-certificate-expiry&#34;&gt;Visibility of certificate expiry&lt;/h2&gt;
&lt;p&gt;An expired TLS certificate or one nearing expiry can impact the security of the domains it is securing, and to protect people browsing the web, most modern browsers will stop users accessing websites which have expired certificates.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | May 2024</title>
      <link>https://hexiosec.com/blog/may-2024-update/</link>
      <pubDate>Fri, 31 May 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/may-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;May has seen some more great additions to &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; with better visibility of your rescan allowances, better management of scan group memberships and weekly confirmation emails for Free accounts.&lt;/p&gt;
&lt;h2 id=&#34;better-visibility-of-rescan-allowances&#34;&gt;Better visibility of rescan allowances&lt;/h2&gt;
&lt;p&gt;The rescan functionality in Hexiosec ASM is now more prominent and it&amp;rsquo;s easier to see your allowances. Rescans are particularly useful for ad hoc scans, for example, if you are using them for prospecting as part of a pre-sales process that can run for a few months, refreshing the scan results by rescanning can help to keep conversations up to date and relevant. However Hexiosec ASM does support separate rescan allowances across all three scan types.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>An Introduction to DORA &amp; How ASM Supports Compliance</title>
      <link>https://hexiosec.com/blog/intro-to-DORA/</link>
      <pubDate>Fri, 17 May 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/intro-to-DORA/</guid>
      <description>&lt;h2 id=&#34;what-is-dora&#34;&gt;What is DORA?&lt;/h2&gt;
&lt;p&gt;The Digital Operational Resilience Act (DORA) establishes a unified &lt;a href=&#34;https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en&#34;&gt;ICT risk management framework&lt;/a&gt; for the EU financial sector, requiring the implementation of technical standards in ICT systems by January 17, 2025. The regulation aims to standardise risk management rules across the EU, ensuring consistent standards and strengthening the resilience of the EU financial system.&lt;/p&gt;
&lt;h2 id=&#34;who-does-dora-apply-to&#34;&gt;Who Does DORA Apply To?&lt;/h2&gt;
&lt;p&gt;DORA applies to a broad range of financial institutions within the EU, including banks, investment firms, credit institutions, crypto-asset service providers, and crowdfunding platforms. It also covers third-party service providers that offer ICT systems and services to financial firms, such as cloud services and data centres.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | April 2024</title>
      <link>https://hexiosec.com/blog/april-2024-update/</link>
      <pubDate>Mon, 29 Apr 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/april-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;We have released a couple of new, exciting features this month that will help improve your experience with &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;. Simplifying the invites process and improving how IP range seeds are processed will save you time and make sure you get the most out of your scan allowances.&lt;/p&gt;
&lt;h2 id=&#34;roles--groups-on-invites&#34;&gt;Roles &amp;amp; groups on invites&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;The Admin or Owner role&lt;/strong&gt; is required to create and manage invites for new users.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;The process of inviting a new user to your organisation has been streamlined, allowing you to select the relevant role and groups for the new user at point of invitation. This makes it quicker and easier to get new users set up.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Managing Apple Devices in Microsoft 365 With Intune</title>
      <link>https://hexiosec.com/blog/apple-intune-connections/</link>
      <pubDate>Wed, 24 Apr 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/apple-intune-connections/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Whilst it might occasionally make you shout and swear, it &lt;em&gt;is&lt;/em&gt; possible to manage Apple devices from Microsoft 365 and Intune. This blog covers a crucial part of doing so - managing the connections between Apple and Intune.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;ve previously written a two-part guide on getting started with Intune (&lt;a href=&#34;https://hexiosec.com/blog/intune-getting-started-part1/&#34;&gt;part 1&lt;/a&gt;, &lt;a href=&#34;https://hexiosec.com/blog/intune-getting-started-part2/&#34;&gt;part 2&lt;/a&gt;). Part 1 details the pre-requisites for managing Apple devices, and this blog expands on that by focussing on three connectors that you need to keep on top off.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | March 2024</title>
      <link>https://hexiosec.com/blog/march-2024-update/</link>
      <pubDate>Thu, 28 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/march-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;March has seen lots of usability improvements go into &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, making it easier for you to navigate around and drill down into the information you want to focus on.&lt;/p&gt;
&lt;h2 id=&#34;better-guidance-when-creating-new-scans&#34;&gt;Better guidance when creating new scans&lt;/h2&gt;
&lt;p&gt;Your Hexiosec ASM plan determines the scope of the scanning you can do, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The number of scans you can create.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The number of discovered IPs and domains there are in your scans.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We have improved the guidance when creating scans so you can understand the impact the new scan will have on your limits. &lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Rise of Cyber Crime as a Service</title>
      <link>https://hexiosec.com/blog/cyber-crime-as-service/</link>
      <pubDate>Mon, 18 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/cyber-crime-as-service/</guid>
      <description>&lt;h2 id=&#34;introduction-to-cyber-crime-as-a-service&#34;&gt;Introduction To Cyber Crime as a Service&lt;/h2&gt;
&lt;p&gt;In today&amp;rsquo;s digital age, technology and the internet have become an integral part of our lives. However, this increasing reliance on technology has also opened the doors to a new and dangerous phenomenon known as “Cyber Crime as a Service.” This term refers to a model where cyber criminal tools, services, and expertise are made available to individuals or groups for a fee or subscription. It has democratised cyber crime, making it accessible to anyone with the financial means, regardless of their technical skills.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Check Your Business&#39;s Email Security: Download Our Essential Guide Now!</title>
      <link>https://hexiosec.com/blog/email-security-guide/</link>
      <pubDate>Fri, 15 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/email-security-guide/</guid>
      <description>&lt;h2 id=&#34;why-this-guide-is-essential-for-your-business&#34;&gt;Why This Guide is Essential for Your Business&lt;/h2&gt;
&lt;p&gt;In an era where digital threats are evolving at an unprecedented pace, your business&amp;rsquo;s email security is the frontline defence against the sophisticated menace of phishing attacks. Whether you&amp;rsquo;re a start-up or an established enterprise, the consequences of a breach can be severe.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;a href=&#34;#download-the-pdf&#34;&gt;Download the PDF - &amp;ldquo;Email Security: Protecting your business from phishing attacks&amp;rdquo;&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;This guide is your business&amp;rsquo;s lifeline in the digital realm of email security. Here&amp;rsquo;s why it&amp;rsquo;s important to your business:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Cyber Security Issues Facing The Legal Sector</title>
      <link>https://hexiosec.com/blog/legal-sector/</link>
      <pubDate>Tue, 05 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/legal-sector/</guid>
      <description>&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;
      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/4Sfyuzmlrc8?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;
    &lt;/div&gt;

&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;We recently co-hosted a webinar on cyber security in the legal sector with our partners at &lt;a href=&#34;https://cloudguard.ai/resources/webinar-lean-attack-surface/&#34;&gt;CloudGuard&lt;/a&gt;, and thought it would also be a good topic for a blog. We&amp;rsquo;ll cover much of the same here: why is the legal sector such a target for attackers, what can we learn from previous incidents, and what does &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; tell us about their attack surfaces.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | February 2024</title>
      <link>https://hexiosec.com/blog/february-2024-update/</link>
      <pubDate>Thu, 29 Feb 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/february-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With lots of new features underway to be delivered in the coming weeks, February&amp;rsquo;s &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; releases have seen a big focus on our data quality, and the speed and resilience of the system.&lt;/p&gt;
&lt;h2 id=&#34;improvements-to-performance&#34;&gt;Improvements to performance&lt;/h2&gt;
&lt;p&gt;We have focused on two areas of performance - the time it takes for scans to run, and the time it takes for scans to load in the app. The main benefit you will see here is your larger scans will now open up much more quickly in the app, so you will be able to start exploring your results much faster.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Using HTTP Security Headers In Web Application Security</title>
      <link>https://hexiosec.com/blog/understanding-http-headers/</link>
      <pubDate>Wed, 28 Feb 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/understanding-http-headers/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Learn about HTTP security headers and their importance in web application security in this article. Understand their usage, their role in improving data privacy and mitigating cyber threats, and get practical tips for their proper implementation.&lt;/p&gt;
&lt;h2 id=&#34;what-is-http&#34;&gt;What is HTTP?&lt;/h2&gt;
&lt;p&gt;The internet operates like a complex maze filled with countless interactions between clients (such as your computer) and servers (which host the websites you visit). To manage these interactions efficiently, we need standardised protocols for communication. This is where HTTP (Hypertext Transfer Protocol) comes in. HTTP defines a set of rules for how clients and servers communicate.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | January 2024</title>
      <link>https://hexiosec.com/blog/january-2024-update/</link>
      <pubDate>Fri, 26 Jan 2024 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/january-2024-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;December saw the launch of the Free &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; account, and after taking some time off for the Christmas break, the team have been hard at work again bringing new features and improvements to Hexiosec.&lt;/p&gt;
&lt;h2 id=&#34;free-hexiosec-accounts&#34;&gt;Free Hexiosec accounts&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://asm.hexiosec.com/&#34;&gt;You can now try Hexiosec for free!&lt;/a&gt; This means you can start to understand the basics of your attack surface without spending a penny - all you need is a business email address.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>What Is an External Attack Surface?</title>
      <link>https://hexiosec.com/blog/what-is-an-attack-surface/</link>
      <pubDate>Wed, 13 Dec 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/what-is-an-attack-surface/</guid>
      <description>&lt;h2 id=&#34;the-current-challenge&#34;&gt;The current challenge&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;The IT infrastructure of any online company is quickly becoming more complex, distributed, sprawling and fluid – even for small companies. For large companies, keeping on top of what they have online can become an unmanageable task. As a consequence, too many cyber security incidents are caused by shadow IT, forgotten servers and neglected websites.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;A typical company’s infrastructure is progressively spreading out from on-premise and subsidiary networks to the cloud. The increase in home working and remote access requirements also adds complexity. On top of this is the fact that infrastructure is always changing; whether through new resources, new or changed services, or more widespread changes due to company mergers and organisational changes.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>What Is Hexiosec ASM?</title>
      <link>https://hexiosec.com/blog/what-is-hexiosec-asm/</link>
      <pubDate>Wed, 13 Dec 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/what-is-hexiosec-asm/</guid>
      <description>&lt;h2 id=&#34;what-is-it&#34;&gt;What is it?&lt;/h2&gt;
&lt;p&gt;&lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, an Attack Surface Management Solution, is our first product to be released as part of the Hexiosec family. But what exactly is an &lt;a href=&#34;https://hexiosec.com/blog/what-is-attack-surface-management/&#34;&gt;Attack Surface Management Solution&lt;/a&gt;?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;In short, Hexiosec is a tool that is used to discover and assess the security of your organisation&amp;rsquo;s online presence.&lt;/strong&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;Anyone that uses the Internet for any part of their business practices is at risk of &lt;a href=&#34;https://www.bbc.com/news/topics/cp3mvpdp1r2t&#34;&gt;&lt;strong&gt;cyber security attacks&lt;/strong&gt;&lt;/a&gt;, which are recorded in the media all too often.
The effect can cause reputation and customer loss, decline in revenues, loss of competitive advantage, loss of data or exposure, and employees’ inability to be fully productive. Therefore, mitigating against this happening is something all companies need to take seriously.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Analysing IoT Device Network Traffic with VMware Bridge</title>
      <link>https://hexiosec.com/blog/iot-network-analysis-vmware/</link>
      <pubDate>Tue, 12 Dec 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/iot-network-analysis-vmware/</guid>
      <description>&lt;p&gt;&lt;strong&gt;If you have an IoT device that you want to inspect or analyse, this blog details how to configure a network monitoring setup using a Windows laptop that has two network interfaces (Wi-Fi and Ethernet), VMware and the bridged network feature.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;
&lt;p&gt;I recently ran into the problem where I needed to build a network interception capability for an IoT device, but didn&amp;rsquo;t have a spare Wi-Fi USB adapter on hand. Normally I would set up a Wi-Fi network, configure some port forwarding and connect the desired device to it. A few years ago I wrote a &lt;a href=&#34;https://markuta.com/tp-link-archer-t2u-nano-for-tls-traffic-interception/&#34;&gt;blog post&lt;/a&gt; about this approach.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | November 2023</title>
      <link>https://hexiosec.com/blog/november-2023-update/</link>
      <pubDate>Wed, 06 Dec 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/november-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;As we head towards the end of 2023, the &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; development team have been very busy continuing to add new features and improvements.&lt;/p&gt;
&lt;h2 id=&#34;improved-mobile-user-experience&#34;&gt;Improved mobile user experience&lt;/h2&gt;
&lt;p&gt;The power of Hexiosec ASM is in the vast quantity of data that it finds and displays about your attack surface, so in most scenarios using a big screen is going to help you get the most out of it. However there are some scenarios where using Hexiosec on the go is valuable, for example when you&amp;rsquo;re meeting with customers you may wish to consult their scan overview or kick off a new scan.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hype or Reality: Will Quantum Computing Break Encryption?</title>
      <link>https://hexiosec.com/blog/will-quantum-break-encryption/</link>
      <pubDate>Thu, 23 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/will-quantum-break-encryption/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article explores the relationship between quantum computing and encryption, detailing that while quantum computers could break current encryption methods, this threat is not immediate due to technological limitations. It also highlights ongoing work in creating quantum-resistant encryption to secure our digital future.&lt;/p&gt;&lt;/blockquote&gt;
&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;
&lt;p&gt;Quantum computing has been a topic of interest for technologists, cryptographers, and security professionals for quite a while. The prospect of quantum computers, with their massive computational power, and potential for breaking existing encryption schemes has been a matter of ongoing discussion.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>What policies do I need in place as a small business?</title>
      <link>https://hexiosec.com/blog/sme-policies/</link>
      <pubDate>Wed, 15 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/sme-policies/</guid>
      <description>&lt;p&gt;&lt;strong&gt;If you’re running a small business, you may not have thought about all the policies you must have in place, let alone those you should have in place. As with many things, it’s better to be pro-active, as scrambling to produce a policy document that’s been asked of you from a potential customer, or worse, from an employment tribunal, is not fun for anyone. This blog provides an introduction to the different requirements, and gives some pointers for getting started.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | October 2023</title>
      <link>https://hexiosec.com/blog/october-2023-update/</link>
      <pubDate>Tue, 07 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/october-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;October has been another busy one for the &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; team, with even more data being added to our public API as well as summary report co-branding.&lt;/p&gt;
&lt;h2 id=&#34;more-discovery-data-available-from-the-public-api&#34;&gt;More discovery data available from the public API&lt;/h2&gt;
&lt;p&gt;Integrating Hexiosec ASM into your wider toolkit is a great way for your team to work more efficiently. We are committed to continuing to add more data and capabilities to make sure you get the most out of it. Last month we added the ability to get domain information from the API and this month we have also added endpoints for IPs, web presence and out of scope domains. &lt;a href=&#34;https://asm.hexiosec.com/api/ui#tag--scan_data&#34;&gt;Full details of the new endpoints can be found in our public API documentation.&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Vulnerability Identification: Key Concepts And Terms Explained</title>
      <link>https://hexiosec.com/blog/vulnerability-identification/</link>
      <pubDate>Tue, 24 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/vulnerability-identification/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Every day, new cyber threats emerge, targeting organisations and systems worldwide. To manage these threats effectively, it&amp;rsquo;s crucial to understand the core concepts of cyber security and vulnerability identification systems.&lt;/p&gt;
&lt;p&gt;This blog post provides a guide to key vulnerability identification systems in cyber security and explains how they interconnect to manage vulnerabilities. It introduces the following terms:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;strong&gt;Common Vulnerabilities and Exposures (CVE)&lt;/strong&gt; system&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;National Vulnerability Database (NVD)&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Common Vulnerability Scoring System (CVSS)&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Known Exploited Vulnerabilities (KEV)&lt;/strong&gt; catalogue&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Common Platform Enumeration (CPE)&lt;/strong&gt; system&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;understanding-vulnerabilities-and-exploits&#34;&gt;Understanding Vulnerabilities and Exploits&lt;/h2&gt;
&lt;p&gt;At its core, a &lt;strong&gt;vulnerability&lt;/strong&gt; is a flaw or weakness in a system&amp;rsquo;s design, implementation, or operation that can be exploited to violate the system&amp;rsquo;s security policy. These can take various forms, such as buffer overflows, injection flaws, and insecure default configurations.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Exploiting DLL Hijacking in Windows Electron Apps</title>
      <link>https://hexiosec.com/blog/dll-hijacking-and-proxying/</link>
      <pubDate>Wed, 18 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/dll-hijacking-and-proxying/</guid>
      <description>&lt;p&gt;&lt;strong&gt;This blog shows how to identify and abuse DLL hijacking vulnerabilities in Windows Electron apps, as well as the process of developing a proof of concept that utilises DLL proxying. Here we use the Bitwarden Desktop app as an example Electron application, but note that this vulnerability may apply to all Electron apps, including 1Password, Slack, Discord, WhatsApp, Microsoft Visual Studio Code, Microsoft Teams, and many others.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;NOTE: If users are concerned about this issue with Windows applications installed in single user mode, they can uninstall the app and reinstall it for &amp;ldquo;Anyone who uses this computer (all users)&amp;rdquo;, which requires admin rights. When installed for &amp;ldquo;all users&amp;rdquo;, Windows itself has more stringent security controls about replacing DLLs and disallows this behavior.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>ASM: The Missing Piece In Your Cyber Security Strategy</title>
      <link>https://hexiosec.com/blog/asm-the-missing-piece/</link>
      <pubDate>Fri, 06 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/asm-the-missing-piece/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Learn how Attack Surface Management (ASM) improves cyber security by offering a comprehensive perspective on potential entry points. If these are not correctly identified and remediated, they could be exploited by attackers.&lt;/p&gt;
&lt;h2 id=&#34;the-overlooked-importance-of-asm&#34;&gt;The overlooked importance of ASM&lt;/h2&gt;
&lt;p&gt;In cyber security, organisations often face the challenge of selecting suitable tools to integrate into their defence strategy. One crucial component that is frequently overlooked is Attack Surface Management (ASM), also known as External Attack Surface Management (EASM). ASM plays a vital role in identifying vulnerabilities and minimising the risk of cyber attacks. Simply put:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | September 2023</title>
      <link>https://hexiosec.com/blog/september-2023-update/</link>
      <pubDate>Mon, 02 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/september-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With many of the team coming back from summer holidays this month, we&amp;rsquo;ve been pushing forward with new features to improve your &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; experience.&lt;/p&gt;
&lt;h2 id=&#34;discovery-data-from-the-public-api---domains&#34;&gt;Discovery data from the public API - Domains&lt;/h2&gt;
&lt;p&gt;The Hexiosec ASM public API already provides you with the ability to create and manage scans, manage your organisation&amp;rsquo;s groups and obtain the details of &lt;a href=&#34;https://hexiosec.com/blog/action-cyber-risks/&#34;&gt;action&amp;rsquo;s and their risks.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As a first update to start providing &lt;a href=&#34;https://hexiosec.com/asm/asset-discovery/&#34;&gt;discovery data&lt;/a&gt; over the API, you can now use the public API to get in-scope Domains (and linked information) from a scan. This will allow you to extract discovery data from Hexiosec for integration with your own systems or 3rd party applications.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Scanning All UK Local Authorities - Our Work With The CCoE</title>
      <link>https://hexiosec.com/blog/scanning-local-authorities/</link>
      <pubDate>Mon, 02 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/scanning-local-authorities/</guid>
      <description>&lt;h2 id=&#34;the-mission&#34;&gt;The mission&lt;/h2&gt;
&lt;p&gt;Our mission is to help protect citizens and businesses from cyber-attacks, and so we are delighted to have partnered with the &lt;a href=&#34;https://www.ccoe.org.uk/&#34;&gt;Cyber Centre of Excellence (CCoE)&lt;/a&gt; to use &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; to measure and assess the cyber risk of &lt;strong&gt;all 382 local authorities across the UK.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The CCoE are very forward-looking and a fantastic resource for the public sector. From their website:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The Cyber Centre of Excellence (CCOE) is an initiative aimed at all local authorities and UK public bodies to help them stay abreast of cyber threats and give them access to military-grade protection at high street prices.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Getting Started with Microsoft Intune - Part 2</title>
      <link>https://hexiosec.com/blog/intune-getting-started-part2/</link>
      <pubDate>Wed, 27 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/intune-getting-started-part2/</guid>
      <description>&lt;p&gt;&lt;strong&gt;The &lt;a href=&#34;https://hexiosec.com/blog/intune-getting-started-part1/&#34;&gt;first part of this blog&lt;/a&gt; introduced device management and some of the Intune basics. This follow-up covers all the initial setup required for getting Intune deployed.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;setup&#34;&gt;Setup&lt;/h2&gt;
&lt;p&gt;Intune is all managed from the &lt;a href=&#34;https://endpoint.microsoft.com/&#34;&gt;Endpoint Console&lt;/a&gt;, which as per usual, has a new UI coming out. There&amp;rsquo;s also device-related panels in the main admin page, the security pages, and AzureAD/Entra. The following sub-sections list most of the important parts of the various consoles.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Getting Started with Microsoft Intune - Part 1</title>
      <link>https://hexiosec.com/blog/intune-getting-started-part1/</link>
      <pubDate>Thu, 14 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/intune-getting-started-part1/</guid>
      <description>&lt;p&gt;&lt;strong&gt;A recent report has confirmed what many of us suspected: unmanaged devices are still very common amongst many companies around the world. For those on Microsoft 365, the native option for device management is Microsoft Intune, which comes with some Microsoft 365 licenses. This two-part blog details all the basic and intermediate things you&amp;rsquo;ll need to know to get started with Intune, but still only covers a proportion of all that Intune can do.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | August 2023</title>
      <link>https://hexiosec.com/blog/august-2023-update/</link>
      <pubDate>Mon, 04 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/august-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;August has been another busy month for the &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; team, with yet more improvements to our software component detection, and a new Domains export function added.&lt;/p&gt;
&lt;h2 id=&#34;improved-component-detection-on-websites&#34;&gt;Improved component detection on websites&lt;/h2&gt;
&lt;p&gt;Hexiosec ASM can reveal the technology stack of any website including frameworks and JavaScript libraries. We have made improvements to Hexiosec ASM&amp;rsquo;s technology profiler which performs this task. The technology profiler now searches for over a thousand technologies. With increasingly thorough component detection, Hexiosec ASM is able to identify a broader range of risks for vulnerable software components that are present on websites.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Microsoft 365 Email Protections Settings For Administrators</title>
      <link>https://hexiosec.com/blog/m365-email-protections/</link>
      <pubDate>Wed, 23 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/m365-email-protections/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Following on from our &lt;a href=&#34;https://hexiosec.com/blog/inspect-suspicious-emails/&#34;&gt;first blog&lt;/a&gt; on how to inspect suspicious emails, this part looks at what Microsoft 365 administrators can do to prevent suspicious emails getting to users in the first place.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;From an administrator&amp;rsquo;s perspective, when it comes to security protections email is still complicated to properly set up.&lt;/p&gt;
&lt;p&gt;As with many areas of cyber security, there are a raft of expensive options for enterprises but not so much within the budget of smaller companies. Of course, there are relatively expensive options for enterprise email security from Mimecast, Proofpoint, Symantec et al. All these applications can be effective, but anecdotally do require regular administration and can annoy users.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How to Safely Check Suspicious Emails</title>
      <link>https://hexiosec.com/blog/inspect-suspicious-emails/</link>
      <pubDate>Thu, 10 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/inspect-suspicious-emails/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Ever received an email but weren&amp;rsquo;t sure if you could trust it? Of course you have. This blog provides some easy and then (moderately) technical instructions for inspecting a suspicious email. In the &lt;a href=&#34;https://hexiosec.com/blog/m365-email-protections/&#34;&gt;second part&lt;/a&gt; of the blog, we focus on what Microsoft 365 administrators can do to limit the amount of dodgy emails users get in the first place.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Everyone in the world, if they have an email account, has probably received a suspicious email. For regular users, it&amp;rsquo;s often hard to know when to trust an email, and people can be torn between not wanting to miss something important and not wanting to make a cyber security mistake.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hexiosec ASM Is Now Available Through Emerge Digital</title>
      <link>https://hexiosec.com/blog/emerge-digital-partnership/</link>
      <pubDate>Tue, 08 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/emerge-digital-partnership/</guid>
      <description>&lt;p&gt;We are thrilled to announce the partnership between Hexiosec and &lt;a href=&#34;https://emerge.digital/&#34;&gt;Emerge Digital&lt;/a&gt;, bringing enterprise-grade attack surface management to their SME customers.&lt;/p&gt;
&lt;p&gt;As a managed service provider Emerge Digital are committed to ensuring the cyber security of their customers, and the addition of Hexiosec to their &lt;a href=&#34;https://emerge.digital/cyber-security/onyxsecure/&#34;&gt;OnyxSecure&lt;/a&gt; product suite further strengthens their commitment to protecting their customers’ most valuable assets.&lt;/p&gt;
&lt;p&gt;The inclusion of Hexiosec opens up new capabilities for Emerge Digital, with continuous scanning allowing them to proactively address issues for their customers and reduce their vulnerability to cyber-attacks.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | July 2023</title>
      <link>https://hexiosec.com/blog/july-2023-update/</link>
      <pubDate>Tue, 01 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/july-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;ve had another busy month at &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; HQ improving our data and user experience in the ASM platform.&lt;/p&gt;
&lt;h2 id=&#34;additional-data--filtering-on-the-domains-page&#34;&gt;Additional data &amp;amp; filtering on the Domains page&lt;/h2&gt;
&lt;p&gt;The Domains page is a really useful way for people to see what domains they actually have publicly visible on their attack surface. We&amp;rsquo;ve added some extra data to this view to make it even easier to manage. This includes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;DNS destination&lt;/strong&gt; - the IP addresses or domains listed in the DNS record for the domain.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | June 2023</title>
      <link>https://hexiosec.com/blog/june-2023-update/</link>
      <pubDate>Sat, 01 Jul 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/june-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;June has been an exciting month for &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, we&amp;rsquo;ve introduced the ability to create new scans via the public API, as well as the launch of our Documentation site.&lt;/p&gt;
&lt;h2 id=&#34;create-a-scan-via-the-public-api&#34;&gt;Create a scan via the public API&lt;/h2&gt;
&lt;p&gt;Before now, our public API was just a great way to get data for your scans on Hexiosec ASM in an efficient way. Now you can start new scans too.&lt;/p&gt;
&lt;p&gt;The API endpoints are fully documented in our &lt;a href=&#34;https://asm.hexiosec.com/api/ui#overview&#34;&gt;API documentation&lt;/a&gt;, but in summary there are three steps you need to take to create a new scan, similar to the UI journey you will already be familiar with:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Setting up Guest Account Access in Microsoft 365</title>
      <link>https://hexiosec.com/blog/m365-guests-intro/</link>
      <pubDate>Thu, 22 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/m365-guests-intro/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Guest access in Microsoft 365 is a great way of securely collaborating with people outside of your organisation. You can share and collaborate on files, and chat in Teams, all while keeping control of your data inside your tenant. But there&amp;rsquo;s a clear security risk in letting anyone with an email address get to your organisational data. This blog runs through the steps required to configure guest access with sensible security options.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The MOVEit Hack - The Insecurity of Security Products</title>
      <link>https://hexiosec.com/blog/sharing-insecurity/</link>
      <pubDate>Mon, 12 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/sharing-insecurity/</guid>
      <description>&lt;p&gt;&lt;strong&gt;A short blog on the MOVEit hack that&amp;rsquo;s still in progress, but has already affected a number of large organisations in the UK.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;the-incident&#34;&gt;The Incident&lt;/h2&gt;
&lt;p&gt;So what&amp;rsquo;s the problem? It&amp;rsquo;s a critical zero-day vulnerability in MOVEit, which is a file transfer application that runs from a locally installed server (there is also a cloud version, which is unaffected by this issue). The vulnerability, which is a SQL injection leading to full database access, is being tracked as &lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2023-34362&#34;&gt;CVE-2023-34362&lt;/a&gt;. There is already &lt;a href=&#34;https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023&#34;&gt;a patch for it&lt;/a&gt;, as there is for some &lt;em&gt;new&lt;/em&gt; SQL injection vulnerabilities found during a security review that followed the previous issue, and was disclosed &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-moveit-transfer-critical-flaws-found-after-security-audit-patch-now/&#34;&gt;over the weekend&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hunting for Bitwarden master passwords stored in memory</title>
      <link>https://hexiosec.com/blog/extract-bitwarden-vault-passwords/</link>
      <pubDate>Thu, 08 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/extract-bitwarden-vault-passwords/</guid>
      <description>&lt;p&gt;&lt;strong&gt;A blog post on how I was able to identify unknown master passwords stored in the memory of the Bitwarden web extension and desktop client, after a vault has been locked. I also cover the decisions made for developing a proof of concept to automate the process of extracting potential passwords.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;tldr&#34;&gt;TL;DR&lt;/h2&gt;
&lt;p&gt;It is possible to identify unknown Bitwarden master passwords in memory, even after a vault is locked. We developed a proof of concept tool, called BW-dump, that works on Windows platforms. It was tested with Bitwarden desktop app version (2023.2.0).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | May 2023</title>
      <link>https://hexiosec.com/blog/may-2023-update/</link>
      <pubDate>Thu, 01 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/may-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;May has been another busy month for the &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; team, with lots of new features and improvements being delivered.&lt;/p&gt;
&lt;p&gt;This includes a new report type with more detail on your actions, risks and assets, and &amp;ldquo;Checks&amp;rdquo; showing you details of what Hexiosec ASM is checking for.&lt;/p&gt;
&lt;h2 id=&#34;see-what-hexiosec-asm-is-checking-for&#34;&gt;See what Hexiosec ASM is checking for&lt;/h2&gt;
&lt;p&gt;One of the reasons companies invest in attack surface management tools &lt;strong&gt;is to have peace of mind that their company is being monitored for vulnerabilities.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Simplify Your Cyber Risk Management with Actions</title>
      <link>https://hexiosec.com/blog/action-cyber-risks/</link>
      <pubDate>Fri, 26 May 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/action-cyber-risks/</guid>
      <description>&lt;p&gt;The first step when looking to improve your cyber security posture is understanding the risks you are vulnerable to, but once you have visibility of these risks, you then need to plan how to tackle them.&lt;/p&gt;
&lt;p&gt;&lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;&amp;rsquo;s powerful &lt;a href=&#34;https://hexiosec.com/blog/february-2023-update/&#34;&gt;Actions feature&lt;/a&gt; helps you to understand and prioritise the actions you need to take to improve the security of your &lt;a href=&#34;https://hexiosec.com/blog/what-is-an-attack-surface/&#34;&gt;attack surface&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;what-is-an-action&#34;&gt;What is an Action?&lt;/h2&gt;
&lt;p&gt;As the name suggests, an &amp;lsquo;Action&amp;rsquo; is a thing you need to do to resolve one or more risks against your attack surface. Instead of just giving you a long list of risks for you to investigate, Hexiosec groups your risks together based on the resolution required and the domain or IP address the risks are against.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>NIS Regulation Changes Impact On Managed Service Providers</title>
      <link>https://hexiosec.com/blog/how-nis-changes-affect-msps/</link>
      <pubDate>Tue, 09 May 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/how-nis-changes-affect-msps/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;With the ever increasing the number of cyber attacks resulting from vulnerabilities within the supply chain, the UK Government are planning to &lt;strong&gt;widen the scope of the NIS Regulations to include Managed Service Providers (MSPs)&lt;/strong&gt;. This blog takes a look at the specifics and what this all means for MSPs in the UK.&lt;/p&gt;
&lt;h2 id=&#34;what-are-the-current-nis-regulations&#34;&gt;What are the current NIS Regulations?&lt;/h2&gt;
&lt;p&gt;The UK Network and Information Systems (NIS) Regulations 2018 derive from EU law and were enacted into law in May 2018. They aim to set a &lt;strong&gt;high level of cyber security for providers of critical infrastructure and essential services&lt;/strong&gt;, and they provide a legal framework on which &lt;strong&gt;service providers can be held liable&lt;/strong&gt; for not complying - up to £17M depending on the severity of the impact or potential impact.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | April 2023</title>
      <link>https://hexiosec.com/blog/april-2023-update/</link>
      <pubDate>Wed, 03 May 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/april-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;April has seen the introduction of change notifications into &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, alongside a number of other improvements. Keep reading to find out more.&lt;/p&gt;
&lt;h2 id=&#34;change-notifications&#34;&gt;Change notifications&lt;/h2&gt;
&lt;p&gt;For your continuous Own Asset or Third-Party Monitoring scans you can now set up notifications to alert users in your organisation to key changes between the iterations. Change notifications can be set up to alert you of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Newly identified risks with a given severity.&lt;/li&gt;
&lt;li&gt;Risks that are no longer present with a given severity.&lt;/li&gt;
&lt;li&gt;Newly discovered domains.&lt;/li&gt;
&lt;li&gt;Domains that are no longer discovered.&lt;/li&gt;
&lt;li&gt;Newly discovered IPs &lt;/li&gt;
&lt;li&gt;IPs that are no longer discovered&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;By default, you will receive change notifications for new &amp;amp; removed risks, severity high or above. What you get notified of can be varied by scan type, meaning you can have different alerts for scans of your infrastructure to those of any third parties you are monitoring.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Get The Most Out Of Your Hexiosec ASM Notifications</title>
      <link>https://hexiosec.com/blog/scan-notifications/</link>
      <pubDate>Mon, 24 Apr 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/scan-notifications/</guid>
      <description>&lt;p&gt;&lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; supports a number of notification options to help you manage your attack surface effectively. This guide will give you an overview of the options you have and some tips to help understand your results.&lt;/p&gt;
&lt;p&gt;Hexiosec ASM supports 3 types of email notifications:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;There are changes in your scan results&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A scan you have run has completed&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A report you have generated is ready&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;scan-changes-notifications&#34;&gt;Scan Changes notifications&lt;/h2&gt;
&lt;p&gt;Most people won’t have the time to study their attack surface scan results in great detail every day. Hexiosec ASM allows you to set up notifications to be alerted to any changes to your scan that are important to you. &lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | March 2023</title>
      <link>https://hexiosec.com/blog/march-2023-update/</link>
      <pubDate>Tue, 04 Apr 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/march-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;March has been a significant month for &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, seeing the launch of our public API, amongst many other great new features. Read on to find out more.&lt;/p&gt;
&lt;h2 id=&#34;public-api&#34;&gt;Public API&lt;/h2&gt;
&lt;p&gt;Hexiosec ASM now has a public API available allowing you to programmatically access your scan data. Using your existing Hexiosec login, you can easily generate an API key to start accessing your data.&lt;/p&gt;
&lt;p&gt;Data available via version 1 of the API includes:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | February 2023</title>
      <link>https://hexiosec.com/blog/february-2023-update/</link>
      <pubDate>Tue, 28 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/february-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;February has been another month of adding great new features and updating existing functionality. Read on to find out more.&lt;/p&gt;
&lt;h2 id=&#34;a-big-new-feature-actions---which-group-risks-into-actionable-tasks&#34;&gt;A big new feature: &amp;ldquo;Actions&amp;rdquo; - which group risks into actionable tasks&lt;/h2&gt;
&lt;p&gt;Scans will now create &lt;strong&gt;&amp;ldquo;Actions&amp;rdquo;&lt;/strong&gt;. Actions group together risks into actionable items that you can track. For example, &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; may detect lots of Content Security Policy (CSP) risks associated with a particular website and will create a single Action to group these together.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hexiosec ASM Used for Which? Banking Survey</title>
      <link>https://hexiosec.com/blog/which-banking-tests-news/</link>
      <pubDate>Fri, 10 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/which-banking-tests-news/</guid>
      <description>&lt;p&gt;We&amp;rsquo;ve worked again with Which? (aka the Consumers’ Association) to undertake an in-depth study into the cyber security posture of the UKs leading banks, focussing specifically on their online and app security.&lt;/p&gt;
&lt;h2 id=&#34;use-of-hexiosec-asm-for-the-study&#34;&gt;Use of Hexiosec ASM for the study&lt;/h2&gt;
&lt;p&gt;Our consulting team used &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; extensively for this study, to automate what would otherwise have been a very laborious task of online asset discovery (often call &amp;rsquo;enumeration&amp;rsquo;), and the matching of finding against known vulnerabilities and configuration errors.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | January 2023</title>
      <link>https://hexiosec.com/blog/january-2023-update/</link>
      <pubDate>Thu, 09 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/january-2023-update/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;&lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;’s development team have started 2023 with some great new features and updates to existing functionality. As well as updates available now, we have some exciting new features in progress, which you can expect to see soon. Read on to find out more.&lt;/p&gt;
&lt;h2 id=&#34;risks-over-time&#34;&gt;Risks over time&lt;/h2&gt;
&lt;p&gt;Being able to see how many risks there are over time provides an important insight into the state of your infrastructure and can highlight significant changes and trends. Hexiosec ASM already provides risk counts in the reports it generates, and this is also now available in the app.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Identifying Vulnerabilities In Boa Web Servers</title>
      <link>https://hexiosec.com/blog/boa-webserver/</link>
      <pubDate>Wed, 08 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/boa-webserver/</guid>
      <description>&lt;h2 id=&#34;the-boa-web-server---what-is-it&#34;&gt;The Boa web server - what is it?&lt;/h2&gt;
&lt;p&gt;The Boa Web Server was discontinued in 2005, but was a popular web server embedded in IoT devices to access configuration settings.&lt;/p&gt;
&lt;h2 id=&#34;why-should-we-be-concerned&#34;&gt;Why should we be concerned?&lt;/h2&gt;
&lt;p&gt;Microsoft recently did a survey (&lt;a href=&#34;https://www.microsoft.com/en-us/security/blog/2022/11/22/vulnerable-sdk-components-lead-to-supply-chain-risks-in-iot-and-ot-environments/&#34;&gt;Vulnerable SDK components lead to supply chain risks in IoT and OT environments&lt;/a&gt;) and found over 1 million Boa web servers exposed on the internet. This is even more concerning given Boa has vulnerabilities that won&amp;rsquo;t be patched, including:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Testing The Cyber Security Of UK Banks With Which?</title>
      <link>https://hexiosec.com/blog/which-banking-testing/</link>
      <pubDate>Tue, 07 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/which-banking-testing/</guid>
      <description>&lt;p&gt;Every year the consumer organisation &lt;a href=&#34;https://www.which.co.uk/&#34;&gt;Which?&lt;/a&gt; undertakes in-depth testing on the cybersecurity posture of the UKs leading banks. From established high street names to new online-only services, the report aims to give consumers a clear picture on how seriously these companies take their cybersecurity.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://hexiosec.com&#34;&gt;Hexiosec&lt;/a&gt; have provided Which? with technical cyber security expertise on a variety of reports and tests over the years, so we were more than happy to conduct the testing for this article; and of course, much of the online discovery and analysis work was automated using our own attack surface scanning platform &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Discovering Vulnerabilities In The Iris Mobile App &amp; API</title>
      <link>https://hexiosec.com/blog/iris-security-advisory/</link>
      <pubDate>Mon, 09 Jan 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/iris-security-advisory/</guid>
      <description>&lt;h2 id=&#34;affected-products&#34;&gt;Affected products&lt;/h2&gt;
&lt;p&gt;The &lt;a href=&#34;https://www.crocus.co.uk/iris/&#34;&gt;Iris mobile app from Crocus&lt;/a&gt;, version &lt;code&gt;1.3.7&lt;/code&gt; and related backend API (&lt;code&gt;iris-api.crocus.co.uk&lt;/code&gt;).&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s available on the &lt;a href=&#34;https://apps.apple.com/gb/app/id1567052947&#34;&gt;Apple App Store&lt;/a&gt; and the &lt;a href=&#34;https://play.google.com/store/apps/details?id=co.uk.crocus.iris&#34;&gt;Google Play Store&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note: all issues mentioned in this advisory have now been fixed.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;risk&#34;&gt;Risk&lt;/h2&gt;
&lt;p&gt;Leakage of Personally Identifiable Information (PII), specifically email addresses and full names of all registered users. The only requirement is having a registered account, or more specifically, a valid authorization bearer token.&lt;/p&gt;
&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;
&lt;p&gt;We found four issues found with the app and its backend API:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | December 2022</title>
      <link>https://hexiosec.com/blog/december-2022-update/</link>
      <pubDate>Fri, 06 Jan 2023 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/december-2022-update/</guid>
      <description>&lt;p&gt;Every month we strive to make &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; even better and December was no exception. Our team of engineers added some exciting new features to improve the performance and usability of the product, especially for those looking for greater control over their scans.&lt;/p&gt;
&lt;h2 id=&#34;scan-creation-and-scan-types&#34;&gt;Scan creation and scan types&lt;/h2&gt;
&lt;p&gt;When creating a scan, we have made the scan types and quotas available to you clearer.&lt;/p&gt;
&lt;p&gt;You can now see your credit balance, as well as the types of scans available for your organisation depending on your objective (The available options will depend upon your subscription type).&lt;br&gt;
&lt;img src=&#34;images/create-scan-new.webp&#34; alt=&#34;Scan Creation Page&#34;&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | November 2022</title>
      <link>https://hexiosec.com/blog/november-2022-updates/</link>
      <pubDate>Wed, 07 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/november-2022-updates/</guid>
      <description>&lt;p&gt;As always and in the lead up to the festive period, the team have been working hard adding new features to &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;. It&amp;rsquo;s been great for us to engage with our growing user base and understand their needs and how different people interact with the application. This allows us to really focus our engineering time in the most effective way and make sure we&amp;rsquo;re continuing to improve Hexiosec ASM.&lt;/p&gt;
&lt;p&gt;A lot of the engineering effort this month has been focussed on updates and efficiencies for how Hexiosec gathers and processes data, so improvements you won&amp;rsquo;t directly see in the application but will be improving your experience.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Go Big Int (or go home)</title>
      <link>https://hexiosec.com/blog/go-big-int/</link>
      <pubDate>Wed, 30 Nov 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/go-big-int/</guid>
      <description>&lt;p&gt;&lt;strong&gt;This blog exists largely because I was pleased with the title. But also because there aren&amp;rsquo;t many resources or examples of doing things with the big number library in Go.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;what-is-it&#34;&gt;What is it?&lt;/h2&gt;
&lt;p&gt;The &lt;code&gt;math/big&lt;/code&gt; package implements three types, big.Int, big.Float, and big.Rat (for rational numbers) for &amp;ldquo;arbitrary-precision arithmetic (big numbers)&amp;rdquo;, as well as a bunch of useful functions for working with big numbers. See the &lt;a href=&#34;https://pkg.go.dev/math/big&#34;&gt;documentation here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re doing anything with properly big numbers, like those found in cryptographic primitives, you can&amp;rsquo;t avoid using them. But they are somewhat idiosyncratic, and require a different way of doing even basic operations.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Parental Protections Pose Problems for PlusNet Pixel Patching</title>
      <link>https://hexiosec.com/blog/plusnet-pixel-problems/</link>
      <pubDate>Mon, 28 Nov 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/plusnet-pixel-problems/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;If you have got yourself a nice new Pixel 6, and happen to be on PlusNet broadband, have you noticed that the update feature doesn&amp;rsquo;t work? That happened to me, and with a bit of technical investigation I figured out the problem: It&amp;rsquo;s PlusNet&amp;rsquo;s parental control filtering.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;h2 id=&#34;the-pixel-problem&#34;&gt;The Pixel Problem&lt;/h2&gt;
&lt;p&gt;After having my Pixel 6 device for a number of months, I was chatting with a colleague and we happened to get onto the exciting topic of Pixel 6 updates. I was surprised to discover that my device had not installed any updates since I purchased it a number months ago, despite updates being available and pushed out by Google. My phone knew that updates were available, but seemed unable to download the update package, as shown in the screen recording below.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Are Big Companies Getting Email Security Right?</title>
      <link>https://hexiosec.com/blog/email-security-stats/</link>
      <pubDate>Mon, 21 Nov 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/email-security-stats/</guid>
      <description>&lt;p&gt;&lt;strong&gt;We &lt;a href=&#34;https://hexiosec.com/blog/email-security/&#34;&gt;recently&lt;/a&gt; wrote a guide into the basic email security configuration, which includes SPF, DKIM and DMARC. Good practice for all three is well established, and making a mistake could affect how reliably email from your domain is received by the intended recipients. So how well are big companies doing at getting it right? This blog covers some survey research we completed, which shows big companies are far from perfect&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;We have our own tool, written in Go, for grabbing and inspecting a given domain&amp;rsquo;s email configuration. We use it for consultancy, and it&amp;rsquo;s now integrated into &lt;a href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | October 2022</title>
      <link>https://hexiosec.com/blog/october-2022-updates/</link>
      <pubDate>Tue, 01 Nov 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/october-2022-updates/</guid>
      <description>&lt;h2 id=&#34;unlocking-the-power-of-hexiosec-asm-for-many&#34;&gt;Unlocking the power of Hexiosec ASM for many!&lt;/h2&gt;
&lt;p&gt;We have been working hard over the past month making &lt;a class=&#34;asm&#34; href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt;, our attack surface management product, even better with lots of features and improvements throughout the app.&lt;/p&gt;
&lt;p&gt;In particular, we have focused on making Hexiosec even more useful for those who make and manage many different scans. This includes a wide variety of users who have a need to understand the cyber risks and attack surface across their own online assets, third-party vendors, potential customers, or portfolio of businesses.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>1 Million Websites - How Many Use Security.txt?</title>
      <link>https://hexiosec.com/blog/survey-of-security-txt/</link>
      <pubDate>Wed, 26 Oct 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/survey-of-security-txt/</guid>
      <description>&lt;p&gt;&lt;strong&gt;A standard way of publishing security points of contact is now a formal internet standard. If widely adopted, it would make it much easier to report potential security issues and vulnerabilities to companies. Interested in current adoption, we completed a survey to track usage in the top-million sites (Tranco list) on the Internet, top stock market (FTSE 100 and S&amp;amp;P 500) companies, and lastly, several UK financial firms.&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id=&#34;tldr&#34;&gt;TL;DR&lt;/h3&gt;
&lt;p&gt;If you already know all about security.txt files, head straight to the &lt;a href=&#34;#survey&#34;&gt;survey&lt;/a&gt; for the full results. Or if you are more interested in the tool, head over to the &lt;a href=&#34;#download&#34;&gt;download&lt;/a&gt; section, which also includes the CSV survey data. Otherwise, keep reading.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Testing 25 of The Biggest UK Consumer Brands for Which?</title>
      <link>https://hexiosec.com/blog/which-attack-surfaces/</link>
      <pubDate>Thu, 22 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/which-attack-surfaces/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Working with Which? (aka the Consumers&amp;rsquo; Association), we used our new tool &lt;a href=&#34;https://hexiosec.com/asm/&#34;&gt;Hexiosec ASM&lt;/a&gt; to survey the online attack surfaces of 25 big UK companies across five different sectors. You can read the &lt;a href=&#34;https://www.which.co.uk/news/article/the-companies-putting-your-cyber-security-at-risk-amDHr9J3y9dD&#34;&gt;Which? article here&lt;/a&gt;, which puts the findings into context for consumers; we wanted to provide some more technical details on our approach and the findings.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;ve worked with Which? before, on &lt;a href=&#34;https://hexiosec.com/blog/smish-smash/&#34;&gt;spam text messages&lt;/a&gt; and &lt;a href=&#34;https://hexiosec.com/blog/news-routers/&#34;&gt;reviewing ISP routers&lt;/a&gt;, so when Andrew asked if we could help with a new piece of research we were keen to help out. This was not paid work for us; we are happy to partner with Which? on important investigations, and it was a great opportunity to test our tool on some big companies.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>New ASM Features and Improvements | September 2022</title>
      <link>https://hexiosec.com/blog/september-2022-update/</link>
      <pubDate>Fri, 09 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/september-2022-update/</guid>
      <description>&lt;h2 id=&#34;hexiosec-has-been-updated&#34;&gt;Hexiosec has been updated!&lt;/h2&gt;
&lt;p&gt;We are continuously adding new features and improvements to Hexiosec. Here&amp;rsquo;s a summary of what has been added over the last 2 months:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The scan dashboard has been replaced with the new and improved scan overview page.&lt;/li&gt;
&lt;/ol&gt;
&lt;figure class=&#34;center&#34;&gt;&lt;img src=&#34;https://hexiosec.com/blog/september-2022-update/images/FSS-Dashboard.webp&#34;
    alt=&#34;Hexiosec dashboard&#34; width=&#34;600px&#34;&gt;
&lt;/figure&gt;
&lt;ol start=&#34;2&#34;&gt;
&lt;li&gt;You can now contact us inside the app. Want help with your scan or spot a problem? Get in touch easily.&lt;/li&gt;
&lt;/ol&gt;
&lt;figure class=&#34;center&#34;&gt;&lt;img src=&#34;https://hexiosec.com/blog/september-2022-update/images/FSS-Help-Button.webp&#34;
    alt=&#34;Need help button on Hexiosec&amp;#39;s dashboard&#34; width=&#34;400px&#34;&gt;
&lt;/figure&gt;
&lt;ol start=&#34;3&#34;&gt;
&lt;li&gt;We&amp;rsquo;ve been updating our remediation wording to be more helpful when reviewing a risk.&lt;/li&gt;
&lt;/ol&gt;
&lt;figure class=&#34;center&#34;&gt;&lt;img src=&#34;https://hexiosec.com/blog/september-2022-update/images/FSS-Remediation-Advice.webp&#34;
    alt=&#34;Remediation advice on Hexiosec&amp;#39;s platform&#34; width=&#34;800px&#34;&gt;
&lt;/figure&gt;
&lt;ol start=&#34;4&#34;&gt;
&lt;li&gt;You now have more control over domains hosted on Content Delivery Networks (CDNs), making it easier to hide risks linked to IPs managed by a third-party.&lt;/li&gt;
&lt;/ol&gt;
&lt;figure class=&#34;center&#34;&gt;&lt;img src=&#34;https://hexiosec.com/blog/september-2022-update/images/CDNs.webp&#34;
    alt=&#34;Manage CDNs section on the Hexiosec platform&#34; width=&#34;800px&#34;&gt;
&lt;/figure&gt;
&lt;ol start=&#34;5&#34;&gt;
&lt;li&gt;
&lt;p&gt;Didn’t mean to delete your scan? No problem, you can now restore scans.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Getting started with the Windows Sandbox</title>
      <link>https://hexiosec.com/blog/windows-sandbox/</link>
      <pubDate>Wed, 07 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/windows-sandbox/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Want to see where that dodgy link goes, install a temporary application or inspect a suspicious file? If you&amp;rsquo;re on Windows, if you enable the Sandbox it&amp;rsquo;s the perfect tool.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;what-is-it&#34;&gt;What is it?&lt;/h2&gt;
&lt;p&gt;Windows Sandbox is a convenient, pre-installed and licenced virtualised version of Windows. You can launch it, do what you want, and when you close it it&amp;rsquo;s all gone:&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;images/2022-04-21-14-49-04.webp&#34; alt=&#34;Fresh Windows Sandbox desktop on first launch&#34;&gt;&lt;/p&gt;
&lt;p&gt;As the documentation says:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How Secure Is Your Supply Chain?</title>
      <link>https://hexiosec.com/blog/how-secure-is-your-supply-chain/</link>
      <pubDate>Thu, 01 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/how-secure-is-your-supply-chain/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;A ransomware attack on an NHS supplier has shown once again the damage an insecure supply chain can cause to organisations of any size.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;On August 4th, 2022, service provider Advanced identified a ransomware attack against its infrastructure, taking offline vital services for the NHS including medical notes, patient check-ins and the NHS 111 services across a variety of regions.&lt;/p&gt;
&lt;p&gt;Nearly 4 weeks on, NHS services are still having to use pen and paper to track vital patient information with this data then manually entered into the system. This extremely inefficient method is causing massive choke points in NHS services, with staff reporting it &lt;a href=&#34;https://www.bbc.co.uk/news/technology-62725363&#34;&gt;could take 6 months to manually enter the data&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Protect Your Domains From Email Spoofing &amp; Phishing Attacks</title>
      <link>https://hexiosec.com/blog/email-spoofing/</link>
      <pubDate>Wed, 24 Aug 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/email-spoofing/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;The UK National Cyber Security Centre recently published a &lt;a href=&#34;https://www.gov.uk/guidance/protect-domains-that-dont-send-email&#34;&gt;comprehensive guide&lt;/a&gt; on tips to protect government domains that don&amp;rsquo;t send emails from being used to conduct spoofing or phishing attacks. However, as good as the information is, there is always room for improvement…&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;h3 id=&#34;protecting-subdomains&#34;&gt;Protecting Subdomains&lt;/h3&gt;
&lt;p&gt;The advice does provide a great summary of how to address a spoofing issue that many IT security staff may not have previously thought about. However, in the latter section, it says:&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Email Security Basics - Ensuring Deliverability</title>
      <link>https://hexiosec.com/blog/email-security/</link>
      <pubDate>Thu, 11 Aug 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/email-security/</guid>
      <description>&lt;p&gt;&lt;strong&gt;It&amp;rsquo;s 2022, and even with all our technological advancements it&amp;rsquo;s still quite hard to properly configure sending emails from a domain. Whilst some services handle everything for you, many companies will have to manage some part of their email setup themselves. This typically means DNS records for SPF, DKIM and DMARC.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Whilst this only means three simple text entries with your domain registrar, it&amp;rsquo;s still quite easy to make a mistake. And doing so could affect whether people receive your emails, and how your cyber security is rated. This blog covers all three protocols, and provides tips and advice on how to set them up.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Analysing Mobile App Network Traffic with mitmproxy and StrongSwan</title>
      <link>https://hexiosec.com/blog/analysing-mobile-traffic-strongswan-mitmproxy/</link>
      <pubDate>Wed, 27 Jul 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/analysing-mobile-traffic-strongswan-mitmproxy/</guid>
      <description>&lt;p&gt;&lt;strong&gt;A how-to guide on setting up a StrongSwan IPSec (IKEv2) VPN server with mitmproxy to securely monitor and intercept HTTP/HTTPS network traffic, which aids mobile app analysis for both Apple and Android devices.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;h3 id=&#34;what-is-strongswan&#34;&gt;What is StrongSwan?&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://www.strongswan.org/&#34;&gt;StrongSwan&lt;/a&gt; is an open-source IPsec/IKEv2 Virtual Private Network implementation that uses strong encryption standards and authentication methods. It is supported by most modern OSes, such as Linux, Unix, Windows, macOS, and more. At Hexiosec we previously used it for our own hosted VPNs, including a monitored VPN service.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Avoiding MFA Mistakes With Microsoft 365</title>
      <link>https://hexiosec.com/blog/m365-mfa-mistakes/</link>
      <pubDate>Tue, 03 May 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/m365-mfa-mistakes/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Confused by all the options for Multi-Factor Authentication on Microsoft 365? You&amp;rsquo;re not alone, it&amp;rsquo;s a common cause of security issues. But don&amp;rsquo;t worry: we tested three of the different options, so you don&amp;rsquo;t have to.&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;
&lt;h3 id=&#34;the-threat&#34;&gt;The Threat&lt;/h3&gt;
&lt;p&gt;We really shouldn&amp;rsquo;t have to explain this any more, but Multi-Factor Authentication (MFA) is the best defence against account compromise, and can reduce the importance of passwords. You could even argue that MFA is more important than passwords, something we &lt;a href=&#34;https://hexiosec.com/blog/password-quality/&#34;&gt;discussed in a previous blog&lt;/a&gt;. Whilst those in security or IT may be bored at having to evangelise MFA, unfortunately adoption is still no-where near where it should be.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Preventing S3 Bucket Misconfigurations in AWS</title>
      <link>https://hexiosec.com/blog/aws-not-so-private-buckets/</link>
      <pubDate>Mon, 28 Feb 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/aws-not-so-private-buckets/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;This article discusses cloud storage buckets, highlighting potential consequences of bucket misconfiguration. It also demonstrates a real-world example of how easy it can be to accidentally enable public bucket access in a manner that is not obvious to the un-trained eye.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Cloud providers such as Amazon AWS, Google Cloud Platform and Microsoft Azure have seen phenomenal growth over the last five years, as many organisations make the transition to cloud from on-prem hosted services.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Cyber Security Resolutions for Business Owners</title>
      <link>https://hexiosec.com/blog/security-resolutions/</link>
      <pubDate>Tue, 04 Jan 2022 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/security-resolutions/</guid>
      <description>&lt;p&gt;&lt;strong&gt;It&amp;rsquo;s a new year, but in cyber security nothing much has changed. You probably still need to be concerned about phishing, ransomware, data loss and shadow IT. So why not start the year well, and add freshening up your cyber security to the list of resolutions, somewhere in between exercising more and drinking less?&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;i-freshen-up-account-security&#34;&gt;I: Freshen up account security&lt;/h2&gt;
&lt;p&gt;How long until the first big account breach of the year? Sadly it&amp;rsquo;s probably not very long. Unless all of your team&amp;rsquo;s online accounts are in a good state, then there&amp;rsquo;s likely some updating to do. Everyone should make sure that all important passwords are complex, unique and stored in a password manager, and strong Multi-Factor Authentication (ideally using an authenticator application or hardware token) should be turned on for every account that&amp;rsquo;s important to the business.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Key Decisions to Increase Start-Up Success</title>
      <link>https://hexiosec.com/blog/start-ups/</link>
      <pubDate>Mon, 13 Dec 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/start-ups/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Having a great idea is only the first step for a start-up. Some of the early technical decisions that have to be made early on could be the difference between a rapid rise or a quiet failure.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>IONOS Digital Transformation Case Study</title>
      <link>https://hexiosec.com/blog/news-ionos-case-study/</link>
      <pubDate>Thu, 09 Dec 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/news-ionos-case-study/</guid>
      <description>&lt;p&gt;&lt;strong&gt;One of our digital transformation projects was recently released as a case study by &lt;a href=&#34;https://www.ionos.co.uk/&#34;&gt;IONOS&lt;/a&gt;, our UK/EU hosting partner.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Lessons for Securing Your Microsoft 365 Mailboxes</title>
      <link>https://hexiosec.com/blog/m365-mfa-mailbox-trickery/</link>
      <pubDate>Mon, 29 Nov 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/m365-mfa-mailbox-trickery/</guid>
      <description>&lt;p&gt;&lt;strong&gt;We recently helped a customer with an interesting, tricky Microsoft 365 mailbox hack. Thankfully there were no serious consequences, but there were some lessons to learn&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;An existing customer recently recommended us to a supplier of theirs who recently had a near-miss cyber security incident. They fortunately happened to notice something odd in their inbox - the bank account details on an invoice had changed. Clearly in this instance it paid to be eagle-eyed, but as we know from the stories of &lt;a href=&#34;https://www.tripwire.com/state-of-security/featured/fbi-statistics-underline-orrific-cost-of-business-email-compromise/&#34;&gt;BEC&lt;/a&gt;, many aren&amp;rsquo;t so lucky.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Value of Small Teams for Optimised Efficiency</title>
      <link>https://hexiosec.com/blog/small-teams/</link>
      <pubDate>Wed, 20 Oct 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/small-teams/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Small, highly talented teams beat large, average teams. Every time.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;I’d rather have a small team of 10 highly skilled developers, the ninjas, than a team of 100 average developers. Why? Because the 10 will outperform the 100, every time. You might need to pay double, even four times the salary, but it’s still cheaper overall. It’s also easier to manage, easier to interact with and easier to innovate.&lt;/p&gt;
&lt;p&gt;Some say the perfect team size is 7, others say 12. I think it’s somewhere between the two, but is mainly down to how many super stars you can find and employ. If you find one more, hire them anyway.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Automating Testing of TLS Connections</title>
      <link>https://hexiosec.com/blog/fun-with-tls/</link>
      <pubDate>Fri, 17 Sep 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/fun-with-tls/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Programmatically determining the version of the TLS protocol and cipher suites a server supports was not as easy as I expected it to be. TLS provides the Security layer in HTTPS, and secures the connection between you and the server when visiting websites. Previous versions of TLS are now deprecated and have known vulnerabilities. Checking a server isn&amp;rsquo;t running these outdated versions is a very important step in checking a website is secure. These are the steps I took to get to a working script.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Building a Better File Sharing Application</title>
      <link>https://hexiosec.com/blog/trebuchet-launch/</link>
      <pubDate>Mon, 23 Aug 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/trebuchet-launch/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;As a consultancy, we&amp;rsquo;re constantly having to share and receive files with potential and actual customers. And as regular people, we also want to easily share files with family, friends, and financial advisors. But we couldn&amp;rsquo;t find a sharing tool that worked for all of our requirements, so inspired by an open-source project, we built it ourselves. And we hope you might want to use it too.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Cyber Security Tips For SMEs - Video Interview</title>
      <link>https://hexiosec.com/blog/top-tips-smes/</link>
      <pubDate>Tue, 20 Jul 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/top-tips-smes/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Our CEO Rob recently recorded two interviews with &lt;a href=&#34;https://businessgrowthbureau.tv/meet-the-founder/&#34;&gt;Rupert Honywood of the Business Growth Bureau&lt;/a&gt;, on cyber security tips for Small to Medium Enterprises, and how to protect against phishing.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Smashing the Smishers</title>
      <link>https://hexiosec.com/blog/smish-smash/</link>
      <pubDate>Tue, 29 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/smish-smash/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Anyone recently received a weird text message with a dodgy link in it from &amp;ldquo;HMRC&amp;rdquo;, &amp;ldquo;Hermes&amp;rdquo;, &amp;ldquo;DHL&amp;rdquo; or even &amp;ldquo;Royail Mail&amp;rdquo;? Yeah, us too - it&amp;rsquo;s smishing, and it&amp;rsquo;s rampant in the UK. So, what can we do about it? Prompted by an investigation from &lt;a href=&#34;https://www.which.co.uk/news/2021/06/three-in-five-people-have-received-a-scam-delivery-text-in-the-last-year/&#34;&gt;Which?&lt;/a&gt;, we gave detection a go&amp;hellip;&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;what-is-it&#34;&gt;What is it?&lt;/h2&gt;
&lt;p&gt;If you have a phone then you&amp;rsquo;ve probably seen something like it, but you may not have seen the term &lt;code&gt;smishing&lt;/code&gt;, a somewhat ugly portmanteau of &lt;code&gt;SMS&lt;/code&gt; and &lt;code&gt;phishing&lt;/code&gt; (see also: &lt;code&gt;vishing&lt;/code&gt; for voice phishing aka malicious phone calls).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Kubernetes For Digital Transformation - Webinar</title>
      <link>https://hexiosec.com/blog/kubernetes-digx/</link>
      <pubDate>Thu, 03 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/kubernetes-digx/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;At Hexiosec we&amp;rsquo;ve used containers and Kubernetes to move customer systems into the cloud, and have built our own tools and services to take advantage of a containerised, cloud-native approach. This webinar details why Kubernetes is perfect for such applications. It was recorded by our CTO David Griffiths, along with our cloud partner &lt;a href=&#34;https://www.ionos.co.uk/hosting/dedicated-hosting&#34;&gt;IONOS&lt;/a&gt;.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The webinar covers what we mean by digital transformation, and then provides an overview of the benefits of containers and Kubernetes for digital transformation projects.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Insecurity Of ISP Routers: Our Work With Which?</title>
      <link>https://hexiosec.com/blog/news-routers/</link>
      <pubDate>Thu, 06 May 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/news-routers/</guid>
      <description>&lt;p&gt;&lt;strong&gt;To accompany recent research into the security of common Internet Service Provider (ISP) routers, we lament the current state of security in network devices, both personal and enterprise.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Passwords - How much do they matter?</title>
      <link>https://hexiosec.com/blog/password-quality/</link>
      <pubDate>Fri, 19 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/password-quality/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Prompted by an oldish Microsoft blog about how too many people focus on password complexity, this blog discusses how much passwords matter for security, relative to other protections such as MFA and Password Managers.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Tips &amp; Tricks For Using WSL &amp; Windows Terminal</title>
      <link>https://hexiosec.com/blog/wsl-tips/</link>
      <pubDate>Wed, 17 Feb 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/wsl-tips/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;I&amp;rsquo;ve been using both the second version of the &lt;a href=&#34;https://docs.microsoft.com/en-us/windows/wsl/about&#34;&gt;Windows Subsystem for Linux (WSL2)&lt;/a&gt;, and the newish &lt;a href=&#34;https://devblogs.microsoft.com/commandline/introducing-windows-terminal/&#34;&gt;Windows Terminal&lt;/a&gt; for quite a while, and thought it&amp;rsquo;d be useful to collate some tips and tricks on them all into a single blog.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A New Cyber Security Mindset for 2021</title>
      <link>https://hexiosec.com/blog/2021-looking-forward/</link>
      <pubDate>Wed, 10 Feb 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/2021-looking-forward/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Looking forward to 2021, I wanted to write an article not about the FireEye breach or SolarWinds Orion supply chain attack (enough of that has been written), but about what we as in the Cyber Security industry can do about it. The change required is an important and fundamental one.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A Look Back at Cyber Security in 2020</title>
      <link>https://hexiosec.com/blog/2020-looking-back/</link>
      <pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/2020-looking-back/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Let&amp;rsquo;s be honest, 2020 will not be remembered fondly by many people. Having celebrated its passing, let&amp;rsquo;s have a quick look back on the big cyber security events and trends that happened over the year&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hardware Security Modules - A Step Forward in Cyber Security?</title>
      <link>https://hexiosec.com/blog/hardwaremodules/</link>
      <pubDate>Wed, 16 Dec 2020 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/hardwaremodules/</guid>
      <description>&lt;p&gt;&lt;strong&gt;A couple of weeks ago &lt;a href=&#34;https://www.microsoft.com/security/blog/2020/11/17/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs/&#34;&gt;this Microsoft announcement&lt;/a&gt; about a new hardware security module came out without much fanfare, even though it could represent a big change for the security of new Windows devices. This blog provides some background on the use of dedicated hardware security modules in different platforms, and highlights their relative weaknesses and advantages.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Affordable Kubernetes for Personal Projects</title>
      <link>https://hexiosec.com/blog/affordable-kubernetes-for-personal-projects/</link>
      <pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/affordable-kubernetes-for-personal-projects/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Running a Kubernetes cluster doesn&amp;rsquo;t have to be expensive. In this article I discuss how I&amp;rsquo;ve set up a Kubernetes cluster that is affordable for personal projects.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>So Macho - A look at Apple executable files</title>
      <link>https://hexiosec.com/blog/macho-files/</link>
      <pubDate>Wed, 02 Dec 2020 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/macho-files/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Apple code signing has been in the news lately, with the new macOS update having &lt;a href=&#34;https://arstechnica.com/gadgets/2020/11/macos-big-sur-launch-appears-to-cause-temporary-slowdown-in-even-non-big-sur-macs/&#34;&gt;initial problems&lt;/a&gt;, as well as adding &lt;a href=&#34;https://github.com/golang/go/issues/42684&#34;&gt;extra steps&lt;/a&gt; for developers building software.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Code signing and application permissions on Apple devices both rely on the Mach-O format, which is used for executable files on both macOS and iOS. This blog provides an overview of the structure of Mach-O binaries, and how they implement code signing and application permissions. We also introduce a new open-source tool we&amp;rsquo;ve written for parsing interesting information from Mach-O files.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Digital Transformation: Not Just Adopting New Technology</title>
      <link>https://hexiosec.com/blog/digital-transformation-dynamo/</link>
      <pubDate>Wed, 18 Nov 2020 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/digital-transformation-dynamo/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Taking new technologies and overlaying them on today’s practices isn’t enough. Companies must undergo a transformation, a &amp;lsquo;digital transformation&amp;rsquo;, in order to fully reap the rewards.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The adoption of the dynamo, a disruptive technology of the 19th century seen through the eyes of a victorian engineer, provides an insightful analogy.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>British Airways Fined Over 2018 Hack - Was It Enough?</title>
      <link>https://hexiosec.com/blog/british-airways-fine/</link>
      <pubDate>Tue, 20 Oct 2020 00:00:00 +0000</pubDate>
      
      <guid>https://hexiosec.com/blog/british-airways-fine/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Is £20M an appropriate fine for British Airways from the ICO for the 2018 hack that exposed the personal data of hundreds of thousands of people, including credit card details?&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>
