Blog

Image
Supply Chain Attacks

Justice AV Solutions incident (CVE-2024-4978)

In May 2024 Rapid7 detected supply chain attack on Justice AV Solutions (JAVS) Viewer software. First mentions of JAVS official website serving malicious installer appeared a month earlier...

Image
Supply Chain Attacks

Supply Chain Attacks and Security

This time instead of reading, we invite you to do some watching. We made a short, 8-minutes long video showing why supply chain attacks and exploits are able to run for a long time before being detected and how our system can spot them as they happen.

Image
GitHub

GitHub Actions Code Signing with Azure Key Vault HSM, RBAC, OIDC and Managed Identity

Today, I'd like to take a break from our usual supply chain attack topics and talk about something that is covered on the internet, but only if you look long enough, combine multiple sources and engage in some educated guesswork and experimentation.

Image
SBOC

Why SBOM Is Not Enough in the Era of Supply Chain Attacks

As cyber-attacks become increasingly sophisticated and frequent, the need for effective cybersecurity measures is more important than ever. We at Forelens have taken an innovative approach to cybersecurity, in which we have developed a new concept called SBOC (Software Bill of Connections), similar to SBOM (Software Bill of Materials) but focusing on applications and their network connections (domains, IP addresses).

Image
Supply Chain Security

Detect the Trojanized Comm100 Chat Installer

Supply chain attacks have become a major concern for organizations around the world. These attacks involve hackers targeting a company's supply chain in order to gain access to their systems and data. Recently, a trojanized installer (Comm100 Chat Installer) by the Canadian company Comm100 Network Corporation was discovered, which affected a number of organizations globally

Image
Supply Chain Security | Forelens

Your Security Is At The Risk Of Someone Else's Weakness

If your company uses computers, one of many applications you depend on might be susceptible to an unknown threat that your existing cybersecurity solutions cannot detect before it’s too late. This can be an exploit (Log4j) or an otherwise legitimate and even digitally signed software that was maliciously modified during an update (SolarWinds, Asus, Kaseya)

Image
Zero-Day Exploits

Protect Your Business from Zero-Day Exploits

Zero-day exploits are a serious concern for businesses of all sizes. These exploits take advantage of vulnerabilities in software that are unknown to the manufacturer, and they can be used by attackers to gain unauthorized access to systems and data

1