logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Running away from the pitfall of insecure browsing

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 22, 2023
    March 22, 2023
    Rewterz Threat Alert – Mekotio Banking Trojan aka Melcoz – Active IOCs
    Severity Medium Analysis Summary Mekotio is a banking trojan that targets users in Latin America and Europe. It is primarily distributed via phishing emails and infected […]
    March 22, 2023
    March 22, 2023
    Rewterz Threat Update – Cyber Threat Intelligence Advisory – 23rd March Pakistan Day
    Analysis Summary Overview – 23rd Mar – A Big Day –  As we approach the 23rd of March, Pakistan Day, organizations and individuals should be aware […]
    March 22, 2023
    March 22, 2023
    Rewterz Threat Advisory -Multiple Jenkins Products Vulnerabilities
    Severity High Analysis Summary CVE-2023-28684 CVSS:7.1 Jenkins remote-jobs-view-plugin Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Running away from the pitfall of insecure browsing

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 22, 2023
    March 22, 2023
    Rewterz Threat Alert – Mekotio Banking Trojan aka Melcoz – Active IOCs
    Severity Medium Analysis Summary Mekotio is a banking trojan that targets users in Latin America and Europe. It is primarily distributed via phishing emails and infected […]
    March 22, 2023
    March 22, 2023
    Rewterz Threat Update – Cyber Threat Intelligence Advisory – 23rd March Pakistan Day
    Analysis Summary Overview – 23rd Mar – A Big Day –  As we approach the 23rd of March, Pakistan Day, organizations and individuals should be aware […]
    March 22, 2023
    March 22, 2023
    Rewterz Threat Advisory -Multiple Jenkins Products Vulnerabilities
    Severity High Analysis Summary CVE-2023-28684 CVSS:7.1 Jenkins remote-jobs-view-plugin Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – CVE-2018-6973 and CVE-2018-3646 VMWare Workstation Player Multiple Vulnerabilities
August 16, 2018
Rewterz
Rewterz Threat Advisory – CVE-2018-8414 Microsoft Windows Shell Remote Code Execution Vulnerability
August 17, 2018

Running away from the pitfall of insecure browsing

August 16, 2018

This is an infomercial on understanding and avoiding insecure browsing to ensure cyber security and threat mitigation.

 

MAKING SURE THAT A WEBSITE IS HTTPS CONFIGURED 

 

If a website’s URL does not start with https, that means the website does not have an SSL (Secure Sockets Layer) certificate. Missing an SSL certificate means a website is not marked as safe by any of the standardized certificate providers and may contain malicious content.

 

An SSL certificate is a small data file, binding a cryptographic key to an organization’s details digitally. An SSL certificate activates the padlock when installed on a server. The https protocol allows secure connection from a web server to a browser by ensuring secure encryption of the communication.

 

As per Google’s plan a few years back, “HTTPS Everywhere” was a concrete goal to be achieved. The trend caught on in 2017, and it is believed that Google Chrome will start marking websites as insecure from July 2018, if they fail to update to HTTPS.

 

The race to acquire HTTPS configuration on websites seems legit, as Google Chrome claims that the default use of HTTPS on the top 100 sites has risen from 37 in 2016 to 81 in the initial months of 2018.

 

UNDERSTANDING SECURE BROWSING

 

When a website is HTTP configured (Hyper Text Transfer Protocol), instead of HTTPS configured (Hyper Text Transfer Protocol Secure), the interaction between a site and a user is in plain text which can be accessed by an attacker.

 

To ensure privacy and security, HTTPS encrypts all the interaction back and forth so that an attacker is unable to understand the coding.

 

Owing to the damaging vulnerability in HTTP, HTTPS was designed with the following features:

 

  1. To convert all plaintext into ciphertext, making it extremely hard for the attackers to decode.
  2. Authentication of the site is required which is achieved by providing SSL certificates, verifying website’s addresses.
  3. HTTPS provides a mechanism to detect tampering or information violation in transmission. This facilitates data integrity.

When you’re using public networks like café Wi-Fi, and you’re interacting with an HTTP site, your data can be leaked using packet sniffer tools, used by attackers to intercept and gather packets on networks.

 

In such cases, an attacker can even access your login information in plaintext. Moreover, they can also alter the content in transmission, tricking a user to download malware.

 

Even if no sensitive information is being communicated with an HTTP site over a public network, behavioral data can still be collected and identities can be breached by the attackers.

 

DRAWBACKS OF NOT HAVING HTTPS CONFIGURATION 

 

  • The websites not starting with https are ranked lower by Google’s ranking algorithm.
  • Not configuring a site with HTTPS may lead to a compromise in brand reputation.
  • Search engines including the search mania of Google have been giving HTTPS configured websites a special boost since 2014.

 

Therefore, HTTPS is a good option for organizations to improve their google ranking if they’re using HTTP.

 

INDICATORS OF A SAFE WEBSITE  

 

Look for the green padlock next to a website’s URL in the address bar. It’ll read “Secure” if the website has enabled data encryption using HTTPS, and the URL will start with HTTPS. This indicates that the website owns a valid SSL/TLS certificate.

 

If the padlock displays “not secure” in red, with a strikethrough the https, this indicates that the website’s certificate has expired or not purchased. Clicking on the padlock reveals the status of the certificate of the website.

 

However, the hacker World has transcended these basic security measures now. A good indicator of a malicious site could be a typo in the domain name, despite an HTTPS configuration.

 

Owing to the ever-growing cyber-attacks, some websites attempt to impersonate other secure and trusted websites and are able to acquire an SSL certificate. But if the domain name doesn’t look original, do not trust the green padlock saying secure. An example would be, linked1n.com, which has a typo in it. Most users are unable to detect the spelling change and will consider the site to be LinkedIn. Any information provided to such duplicate sites can be breached by hackers.

CONCLUSION

 

Understanding and implementing Secure browsing is important for threat mitigation. The hacker world is a jungle out there, inventing and implementing new attacking techniques every day. Users are advised to keep an eye for suspicious website addresses, check HTTPS configuration before providing confidential information like credit card numbers or passwords.

 

In a more advanced case, organizations need to train employees in detecting malicious sites, based on typos in the domain names even if they have acquired SSL certificates.

 

                   

If you think you are a victim of a cyber-security attack. Immediately send an email to info@rewterz.com for a rapid response.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo