Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In November, the team discussed notable vulnerabilities and trends, gave a crash course on security operations center (SOC) metrics, and provided insights on a recent SOC engineering exercise.
The Vulnerability Management Team Lead, looked at vulnerabilities and trends from October. As many as 2,500 vulnerabilities were disclosed, and 16 of those vulnerabilities were high risk. Of those 16, nine were zero-day vulnerabilities, which is within the historical range of nine to 10. The zero days impacted products from Microsoft, Apple, Apache, Atlassian, Citrix, F5, HTTP/2 protocol, and GNU C Library.
He talked in detail about three of the zero-day vulnerabilities, providing an overview on how the vulnerability occurs and how to remediate it:
The SOC Operations Lead, provided metrics on the vast number of alerts that Pondurance experiences in a given month. He explained that the SOC ingested a total of 118 billion total log messages during the month of October, and those log messages were related to more than 245 million log events! Of those events, the SOC triggered 17,263 alerts, for an average of over 550 alerts per day or 20 alerts per hour for the entire month. Of those triggered alerts, the SOC determined that 454 alerts (2.6% of them) were worthy of escalation or seen as something that could have been actionable.
To further break down the alert metrics, the SOC Operations Lead explained how the triggered alerts for October were divided into critical, high, moderate, low, and informational categories. There were 407 informational alerts, 2,704 low alerts, 6,804 moderate alerts, 6,156 high alerts, and 1,192 critical alerts. Criticals and highs are the alerts that warrant the most attention, with the team checking on the endpoint, checking the alert, checking the history of the machine for the alert, and performing an in-depth investigation as needed.
He also discussed the October numbers for mean time to acknowledge (MTTA) and mean time to resolve (MTTR). MTTA, the time it takes for the SOC to identify and prioritize an alert, totaled 11 minutes, 42 seconds. MTTR, the time it takes to address and escalate the alert to the client with corrective actions or recommendations, totaled 1 hour, 1 minute, 34 seconds.
The SOC Engineering Lead, discussed an internal SOC-led phishing exercise that was conducted in February. The five-day phishing campaign included an initial email to Pondurance clients, an artificial intelligence (AI) website, and a follow-up email. The Pondurance team used endpoint detection and response (EDR) to see who clicked on what link and who ran what command. The EDR had the ability to track when users clicked, investigated, or visited the website on their own. The team was interested to see which users would dig deeper and what they did with the data.
He discussed the lessons learned from the campaign. Overall, the campaign did entice people to engage with the website, though it didn’t generate as much interest as the team had expected. Only a few people clicked the “report as phishing” button. The EDR was able to track the users that clicked on or ran a command. The team found people interacting with the website from nonwork devices. The team also found that users went to VirusTotal or UrlScan or investigated the website in some other way before they clicked, which means they were doing their due diligence and not just blindly running commands or visiting the website.
The SOC Engineering Lead also offered several phishing tips for users:
The Pondurance team will host another webinar in December to discuss new cybersecurity activity. Check back next month to read the summary.