{"id":238,"date":"2022-03-03T23:07:00","date_gmt":"2022-03-03T23:07:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=238"},"modified":"2024-01-08T21:06:12","modified_gmt":"2024-01-08T21:06:12","slug":"identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/","title":{"rendered":"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform"},"content":{"rendered":"\n<p>The situation in Ukraine highlights that cyber attacks are an integral part of modern warfare and impact organizations outside of the central conflict. As a result, governments and security agencies globally are advising organizations to be prepared for continued attacks related to the current crisis.<\/p>\n\n\n\n<p>Effective immediately, the CyCognito platform is able to help identify and mitigate the gaps used by Russian state-sponsored threat actors. The platform has an Exploit Intelligence Advisory that aligns with&nbsp;<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-011a\">CISA \u200b\u200bAlert (AA22-011A)<\/a>. We are making this Exploit Intelligence Advisory and the Advisory for Log4Shell available free of charge for all CyCognito customers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About Exploit Intelligence Advisories<\/h2>\n\n\n\n<p>As a brief background, CyCognito\u00a0<a href=\"\/platform\/exploit-intelligence.php\">Exploit Intelligence<\/a>\u00a0Advisories provide you with an understanding of all assets susceptible to a particular threat; in this case, Russian state-sponsored cyber threats as described in CISA Alert AA22-011A. Summary results are shown as a pie chart (see image below) that is divided between assets that tested as \u2013<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vulnerable, or<\/li>\n\n\n\n<li>Not vulnerable<\/li>\n<\/ul>\n\n\n\n<p>Advisory Example:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"454\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png\" alt=\"\" class=\"wp-image-239\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png 860w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM-512x270.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM-768x405.png 768w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/><\/figure>\n\n\n\n<p>This allows you to see and communicate the domain of potential risk and the range of assets in your attack surface that are currently vulnerable to a cyber attack of the type described in CISA AA22-011A.<\/p>\n\n\n\n<p>As with other security issues\u00a0<a href=\"\/platform\/\">detected by the CyCognito platform<\/a>, a wealth of information is provided to help you operationalize risk management and accelerate remediation. From the Advisory, you can drill down to understand the relevant details and take remediation actions. With Exploit Intelligence, you can also safely validate whether the vulnerabilities enumerated in the Advisory can be exploited. This provides your Security and IT Operations teams with evidence to prioritize remediation efforts and it also increases remediation efficiency.<\/p>\n\n\n\n<p>CyCognito continues to work diligently to help keep our customers and the industry protected by proactively identifying their attack surface gaps and giving them the information they need to get ahead of attacks and preventing breaches.<\/p>\n\n\n\n<p>If you are interested in experiencing CyCognito Exploit Intelligence in your environment,\u00a0<a href=\"\/contact\/\">let us know<\/a>. If you\u2019re already a CyCognito customer, the Russian state-sponsored threat Advisory discussed above is available now in your platform, simply reach out to your Customer Success manager if you\u2019d like to discuss or understand it more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Effective immediately, the CyCognito platform is able to help identify and mitigate the gaps used by Russian state-sponsored threat actors.<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[8,52],"class_list":["post-238","post","type-post","status-publish","format-standard","hentry","category-product","tag-cisa","tag-exploit-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Effective immediately, the CyCognito platform is able to help identify and mitigate the gaps used by Russian state-sponsored threat actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-03T23:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-08T21:06:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png\" \/>\n<meta name=\"author\" content=\"Jeff Romano\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Romano\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/\"},\"author\":{\"name\":\"Jeff Romano\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/ab22a34392339a8e0d27e2b9e7835363\"},\"headline\":\"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform\",\"datePublished\":\"2022-03-03T23:07:00+00:00\",\"dateModified\":\"2024-01-08T21:06:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/\"},\"wordCount\":386,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png\",\"keywords\":[\"CISA\",\"Exploit Intelligence\"],\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/\",\"name\":\"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png\",\"datePublished\":\"2022-03-03T23:07:00+00:00\",\"dateModified\":\"2024-01-08T21:06:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png\",\"width\":860,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/ab22a34392339a8e0d27e2b9e7835363\",\"name\":\"Jeff Romano\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dc71642c04ab331ff3e5e92abfe17340?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dc71642c04ab331ff3e5e92abfe17340?s=96&d=mm&r=g\",\"caption\":\"Jeff Romano\"},\"description\":\"Was Chief Customer Officer at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jeff-romano\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/","og_locale":"en_US","og_type":"article","og_title":"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform | CyCognito Blog","og_description":"Effective immediately, the CyCognito platform is able to help identify and mitigate the gaps used by Russian state-sponsored threat actors.","og_url":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/","og_site_name":"CyCognito Blog","article_published_time":"2022-03-03T23:07:00+00:00","article_modified_time":"2024-01-08T21:06:12+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png","type":"","width":"","height":""}],"author":"Jeff Romano","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeff Romano","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/"},"author":{"name":"Jeff Romano","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/ab22a34392339a8e0d27e2b9e7835363"},"headline":"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform","datePublished":"2022-03-03T23:07:00+00:00","dateModified":"2024-01-08T21:06:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/"},"wordCount":386,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png","keywords":["CISA","Exploit Intelligence"],"articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/","url":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/","name":"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png","datePublished":"2022-03-03T23:07:00+00:00","dateModified":"2024-01-08T21:06:12+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screen-Shot-2022-03-02-at-1.26.20-PM.png","width":860,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Identifying and Mitigating Potential Russian Cyber Attacks \u2013 Proactive Measures in the CyCognito Platform"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/ab22a34392339a8e0d27e2b9e7835363","name":"Jeff Romano","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dc71642c04ab331ff3e5e92abfe17340?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dc71642c04ab331ff3e5e92abfe17340?s=96&d=mm&r=g","caption":"Jeff Romano"},"description":"Was Chief Customer Officer at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/jeff-romano\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=238"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/238\/revisions"}],"predecessor-version":[{"id":515,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/238\/revisions\/515"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}