<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>SALTT Tech Insights</title>
    <link>http://www.saltt.tech/insights</link>
    <description>SALTT Technologies explores the importance of cloud security and the best practices that organisations should follow to ensure the safety of their data.</description>
    <language>en</language>
    <pubDate>Sun, 12 Apr 2026 22:54:40 GMT</pubDate>
    <dc:date>2026-04-12T22:54:40Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Korrosiv.AI Is Changing Penetration Testing</title>
      <link>http://www.saltt.tech/insights/korrosiv-ai-changing-penetration-testing-australia</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/korrosiv-ai-changing-penetration-testing-australia" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/Cybersecurity%20Dashboard%20Conference%20Room%20at%20Dusk.png" alt="Korrosiv.AI Is Changing Penetration Testing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;Traditional penetration testing has a coverage problem. A typical web application assessment covers somewhere between 20 and 40 per cent of an application's actual attack surface. Human testers make judgment&amp;nbsp;calls about where to focus — and those calls are necessarily informed by time, scope, and prior experience. The endpoints and parameters that fall outside that window go untested.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/korrosiv-ai-changing-penetration-testing-australia" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/Cybersecurity%20Dashboard%20Conference%20Room%20at%20Dusk.png" alt="Korrosiv.AI Is Changing Penetration Testing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;Traditional penetration testing has a coverage problem. A typical web application assessment covers somewhere between 20 and 40 per cent of an application's actual attack surface. Human testers make judgment&amp;nbsp;calls about where to focus — and those calls are necessarily informed by time, scope, and prior experience. The endpoints and parameters that fall outside that window go untested.&lt;/p&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fkorrosiv-ai-changing-penetration-testing-australia&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>Artificial Intelligence</category>
      <category>Penetration Testing</category>
      <pubDate>Sun, 12 Apr 2026 22:48:08 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/korrosiv-ai-changing-penetration-testing-australia</guid>
      <dc:date>2026-04-12T22:48:08Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>AI-Driven Penetration Testing: What It Means for Your Program</title>
      <link>http://www.saltt.tech/insights/ai-driven-penetration-testing-australia</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/ai-driven-penetration-testing-australia" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/AIPowered%20Cybersecurity%20Audit%20in%20Digital%20Fortress.png" alt="AI-Driven Penetration Testing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Penetration testing has not changed much in its fundamentals over the past two decades. A skilled consultant, a defined scope, a time-boxed engagement, a report. The tools have evolved, but the model — human testers working through an application or network looking for exploitable weaknesses — has remained largely constant.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/ai-driven-penetration-testing-australia" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/AIPowered%20Cybersecurity%20Audit%20in%20Digital%20Fortress.png" alt="AI-Driven Penetration Testing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Penetration testing has not changed much in its fundamentals over the past two decades. A skilled consultant, a defined scope, a time-boxed engagement, a report. The tools have evolved, but the model — human testers working through an application or network looking for exploitable weaknesses — has remained largely constant.&lt;/p&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fai-driven-penetration-testing-australia&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>Artificial Intelligence</category>
      <category>Penetration Testing</category>
      <pubDate>Sun, 12 Apr 2026 22:48:00 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/ai-driven-penetration-testing-australia</guid>
      <dc:date>2026-04-12T22:48:00Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>What a Penetration Test Actually Tells You</title>
      <link>http://www.saltt.tech/insights/what-penetration-test-tells-you-results</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/what-penetration-test-tells-you-results" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/Network%20Vulnerability%20to%20Remediation%20Workflow.png" alt="What a Penetration Test Actually Tells You" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most organisations that commission a penetration test understand, broadly, what they are asking for: a skilled consultant to attempt to break into their systems and tell them what they find. The report arrives. There are findings. And then — for a surprising number of organisations — not much happens.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/what-penetration-test-tells-you-results" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/Network%20Vulnerability%20to%20Remediation%20Workflow.png" alt="What a Penetration Test Actually Tells You" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most organisations that commission a penetration test understand, broadly, what they are asking for: a skilled consultant to attempt to break into their systems and tell them what they find. The report arrives. There are findings. And then — for a surprising number of organisations — not much happens.&lt;/p&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fwhat-penetration-test-tells-you-results&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>Penetration Testing</category>
      <pubDate>Sun, 12 Apr 2026 22:47:49 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/what-penetration-test-tells-you-results</guid>
      <dc:date>2026-04-12T22:47:49Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>Essential 8 in 2026: What's Changed and Where to Focus First</title>
      <link>http://www.saltt.tech/insights/essential-8-2026-whats-changed-where-to-focus</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/essential-8-2026-whats-changed-where-to-focus" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/Cybersecurity%20Office%20with%20Whiteboard%20and%20Bookshelf-1.png" alt="Essential 8 in 2026: What's Changed and Where to Focus First" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;The Essential 8 has been part of the Australian cybersecurity landscape for nearly a decade. In that time it has evolved from a recommended baseline to a mandated requirement for many Commonwealth entities, and a de facto standard referenced in APRA CPS 234, government procurement frameworks, and board risk reporting across the private sector.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/essential-8-2026-whats-changed-where-to-focus" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/Cybersecurity%20Office%20with%20Whiteboard%20and%20Bookshelf-1.png" alt="Essential 8 in 2026: What's Changed and Where to Focus First" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;The Essential 8 has been part of the Australian cybersecurity landscape for nearly a decade. In that time it has evolved from a recommended baseline to a mandated requirement for many Commonwealth entities, and a de facto standard referenced in APRA CPS 234, government procurement frameworks, and board risk reporting across the private sector.&lt;/p&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fessential-8-2026-whats-changed-where-to-focus&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>Compliance</category>
      <category>Risk</category>
      <pubDate>Sun, 12 Apr 2026 22:46:31 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/essential-8-2026-whats-changed-where-to-focus</guid>
      <dc:date>2026-04-12T22:46:31Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>Russian GRU Router Campaign: What Australian Organisations Must Do</title>
      <link>http://www.saltt.tech/insights/blog/weekly-cyber-brief-2026-04-13</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/blog/weekly-cyber-brief-2026-04-13" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/blog/featured-images/weekly-cyber-brief-2026-04-12-featured-1.png" alt="Abstract illustration of a network router with warning indicators representing a cyber espionage threat." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="blog-post-body"&gt; 
 &lt;p class="hero-summary"&gt;&lt;strong&gt;Russian military intelligence unit APT28 has been systematically compromising consumer and small-business routers to conduct cyber espionage — and the US FBI has just executed a court-sanctioned remote remediation operation to clean up thousands of infected devices. Australian organisations running unmanaged or under-patched edge devices face the same exposure that made this campaign possible.&lt;/strong&gt;&lt;/p&gt; 
 &lt;h2&gt;APT28's Router Espionage Campaign — and the FBI's Unprecedented Response&lt;/h2&gt; 
 &lt;p&gt;Two related stories broke this week that security leaders should read together. Germany's domestic intelligence agency BfV published a warning that Russian military intelligence group &lt;strong&gt;APT28&lt;/strong&gt; — also tracked as Fancy Bear and attributed to the GRU's Unit 26165 — has been exploiting vulnerable &lt;strong&gt;TP-Link routers&lt;/strong&gt; to conduct sustained cyber espionage operations. Days later, iTnews reported that the FBI had already moved against the same infrastructure inside the United States, executing a court-sanctioned operation codenamed &lt;strong&gt;Operation Masquerade&lt;/strong&gt; that remotely patched thousands of privately-owned compromised routers to evict the GRU implants.&lt;/p&gt; 
 &lt;p&gt;The technique is well-established for APT28: compromise edge devices that sit outside the visibility of most endpoint detection tools, use them as anonymising relay infrastructure, and conduct espionage operations through a chain of legitimate-looking IP addresses. Routers are an attractive target precisely because they are rarely monitored, infrequently patched, and often forgotten entirely once installed. From the adversary's perspective, a compromised home or small-business router is a persistent, trusted foothold that generates almost no alerts.&lt;/p&gt; 
 &lt;p&gt;The German warning specifically called out &lt;strong&gt;vulnerable TP-Link internet routers&lt;/strong&gt; as the entry point. While the specific CVE identifiers were not published in the source reporting available this week, the pattern is consistent with APT28's documented preference for exploiting known-but-unpatched vulnerabilities in SOHO (small office/home office) networking equipment — a technique catalogued under MITRE ATT&amp;amp;CK as &lt;strong&gt;T1584.008 (Compromise Infrastructure: Network Devices)&lt;/strong&gt;. Once embedded, the group uses the compromised devices as proxy nodes to obscure the true origin of intrusion attempts against higher-value targets in government, defence, and critical infrastructure.&lt;/p&gt; 
 &lt;p&gt;The FBI's response deserves attention in its own right. Operation Masquerade is notable because federal agents, armed with judicial authorisation, reached directly into privately-owned devices on American networks and applied remediation. This is not the first time US authorities have taken this approach — a 2024 operation against Chinese Volt Typhoon infrastructure used a similar legal mechanism — but it signals that Western governments are willing to act unilaterally on domestic infrastructure when the threat is severe enough. The operation cleaned up thousands of devices, though the exact count and scope were not fully detailed in available reporting.&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;This directly affects Australian organisations for several reasons.&lt;/strong&gt; First, TP-Link routers are widely deployed across Australian homes, small businesses, and remote-work environments. Employees working from home — a permanent fixture of Australian working culture post-pandemic — often connect to corporate systems through consumer-grade routers that receive no enterprise patch management attention. Second, APT28 is not a threat group that limits itself to US or European targets. Australian government agencies, defence industry participants, and organisations connected to AUKUS or Five Eyes intelligence-sharing arrangements are documented targets of Russian state-sponsored espionage. Third, Australia does not have an equivalent legal mechanism for the FBI-style remote remediation that cleaned up US devices — meaning Australian-based compromised routers are unlikely to be remediated by any government action and remain the responsibility of device owners and their ISPs.&lt;/p&gt; 
 &lt;p&gt;The practical risk for a typical Australian enterprise is this: an employee working from home connects through a compromised TP-Link router. APT28 uses that router as a proxy to blend malicious traffic with legitimate user behaviour. Detections fail because the source IP resolves to a plausible residential address. The attacker pivots from the VPN session or web application into the corporate environment. The edge device — the actual point of compromise — is never examined because it sits outside the corporate security perimeter.&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;What Australian organisations should do this week:&lt;/strong&gt;&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;&lt;strong&gt;Audit edge device exposure:&lt;/strong&gt; Survey which router models remote workers are using. TP-Link devices — particularly older models running unpatched firmware — should be prioritised for immediate firmware updates or replacement. Require workers to confirm their home router firmware is current, or consider supplying managed routers to high-risk employees (executives, IT administrators, privileged users).&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Enforce zero-trust principles at the VPN boundary:&lt;/strong&gt; Do not treat inbound VPN connections as inherently trusted. Apply MFA, device health checks, and session monitoring to all remote access, regardless of the connecting IP address. A compromised home router does not automatically compromise a well-enforced zero-trust access policy.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Review network device visibility:&lt;/strong&gt; If your organisation manages its own network hardware — branch office routers, SD-WAN appliances, firewalls — ensure firmware patching is on a defined schedule and that configuration integrity monitoring is in place. APT28 and similar actors exploit the gap between when a patch is released and when it is applied.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Threat hunt for anomalous proxy behaviour:&lt;/strong&gt; If you have network detection capabilities, look for patterns consistent with residential IP addresses making unusual volumes of authentication attempts or accessing sensitive internal resources. Compromised routers used as proxies can produce subtle but detectable traffic anomalies.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Engage your ISP:&lt;/strong&gt; Australian ISPs, in coordination with the ASD, have existing frameworks for alerting customers to compromised devices. If you operate a managed security service or have ISP-level visibility, check whether any flagged device notifications have been issued to your users.&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;The Australian Signals Directorate (ASD) and the ACSC have consistently warned that state-sponsored actors target Australian networks, and APT28 is specifically named in ASD advisories. This week's reporting from Germany and the US confirms the campaign is active and the tradecraft is mature. The remediation window is now.&lt;/p&gt; 
 &lt;h2&gt;Key Takeaways&lt;/h2&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Audit remote workers' router models immediately — TP-Link devices running unpatched firmware are active targets for APT28 espionage infrastructure.&lt;/li&gt; 
  &lt;li&gt;Apply zero-trust access controls at your VPN and remote access boundary; a compromised home router does not need to mean a compromised corporate network.&lt;/li&gt; 
  &lt;li&gt;Schedule firmware patching for all organisation-managed network devices on a defined cadence — APT28 exploits the gap between patch release and application.&lt;/li&gt; 
  &lt;li&gt;Consider supplying managed, IT-configured routers to high-privilege remote workers such as executives, system administrators, and anyone with access to sensitive systems.&lt;/li&gt; 
 &lt;/ul&gt;  
 &lt;p&gt;If you need help assessing your remote access architecture or edge device exposure, SALTT Technologies' Security Architecture &amp;amp; Engineering and CyberOps Management teams work with Australian organisations to close exactly these gaps — contact us to discuss your environment.&lt;/p&gt;   
 &lt;strong&gt;Sources&lt;/strong&gt; 
 &lt;ul&gt; 
  &lt;li&gt;&lt;a href="https://www.itnews.com.au/news/fbi-remotely-patched-privately-owned-routers-to-evict-russian-gru-spies-624880"&gt;FBI remotely patched privately-owned routers to evict Russian GRU spies — iTnews&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.itnews.com.au/news/german-intelligence-agency-warns-of-russian-apt28-cyber-spying-624879"&gt;German intelligence agency warns of Russian APT28 cyber spying — iTnews&lt;/a&gt;&lt;/li&gt; 
 &lt;/ul&gt;  
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/blog/weekly-cyber-brief-2026-04-13" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/blog/featured-images/weekly-cyber-brief-2026-04-12-featured-1.png" alt="Abstract illustration of a network router with warning indicators representing a cyber espionage threat." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="blog-post-body"&gt; 
 &lt;p class="hero-summary"&gt;&lt;strong&gt;Russian military intelligence unit APT28 has been systematically compromising consumer and small-business routers to conduct cyber espionage — and the US FBI has just executed a court-sanctioned remote remediation operation to clean up thousands of infected devices. Australian organisations running unmanaged or under-patched edge devices face the same exposure that made this campaign possible.&lt;/strong&gt;&lt;/p&gt; 
 &lt;h2&gt;APT28's Router Espionage Campaign — and the FBI's Unprecedented Response&lt;/h2&gt; 
 &lt;p&gt;Two related stories broke this week that security leaders should read together. Germany's domestic intelligence agency BfV published a warning that Russian military intelligence group &lt;strong&gt;APT28&lt;/strong&gt; — also tracked as Fancy Bear and attributed to the GRU's Unit 26165 — has been exploiting vulnerable &lt;strong&gt;TP-Link routers&lt;/strong&gt; to conduct sustained cyber espionage operations. Days later, iTnews reported that the FBI had already moved against the same infrastructure inside the United States, executing a court-sanctioned operation codenamed &lt;strong&gt;Operation Masquerade&lt;/strong&gt; that remotely patched thousands of privately-owned compromised routers to evict the GRU implants.&lt;/p&gt; 
 &lt;p&gt;The technique is well-established for APT28: compromise edge devices that sit outside the visibility of most endpoint detection tools, use them as anonymising relay infrastructure, and conduct espionage operations through a chain of legitimate-looking IP addresses. Routers are an attractive target precisely because they are rarely monitored, infrequently patched, and often forgotten entirely once installed. From the adversary's perspective, a compromised home or small-business router is a persistent, trusted foothold that generates almost no alerts.&lt;/p&gt; 
 &lt;p&gt;The German warning specifically called out &lt;strong&gt;vulnerable TP-Link internet routers&lt;/strong&gt; as the entry point. While the specific CVE identifiers were not published in the source reporting available this week, the pattern is consistent with APT28's documented preference for exploiting known-but-unpatched vulnerabilities in SOHO (small office/home office) networking equipment — a technique catalogued under MITRE ATT&amp;amp;CK as &lt;strong&gt;T1584.008 (Compromise Infrastructure: Network Devices)&lt;/strong&gt;. Once embedded, the group uses the compromised devices as proxy nodes to obscure the true origin of intrusion attempts against higher-value targets in government, defence, and critical infrastructure.&lt;/p&gt; 
 &lt;p&gt;The FBI's response deserves attention in its own right. Operation Masquerade is notable because federal agents, armed with judicial authorisation, reached directly into privately-owned devices on American networks and applied remediation. This is not the first time US authorities have taken this approach — a 2024 operation against Chinese Volt Typhoon infrastructure used a similar legal mechanism — but it signals that Western governments are willing to act unilaterally on domestic infrastructure when the threat is severe enough. The operation cleaned up thousands of devices, though the exact count and scope were not fully detailed in available reporting.&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;This directly affects Australian organisations for several reasons.&lt;/strong&gt; First, TP-Link routers are widely deployed across Australian homes, small businesses, and remote-work environments. Employees working from home — a permanent fixture of Australian working culture post-pandemic — often connect to corporate systems through consumer-grade routers that receive no enterprise patch management attention. Second, APT28 is not a threat group that limits itself to US or European targets. Australian government agencies, defence industry participants, and organisations connected to AUKUS or Five Eyes intelligence-sharing arrangements are documented targets of Russian state-sponsored espionage. Third, Australia does not have an equivalent legal mechanism for the FBI-style remote remediation that cleaned up US devices — meaning Australian-based compromised routers are unlikely to be remediated by any government action and remain the responsibility of device owners and their ISPs.&lt;/p&gt; 
 &lt;p&gt;The practical risk for a typical Australian enterprise is this: an employee working from home connects through a compromised TP-Link router. APT28 uses that router as a proxy to blend malicious traffic with legitimate user behaviour. Detections fail because the source IP resolves to a plausible residential address. The attacker pivots from the VPN session or web application into the corporate environment. The edge device — the actual point of compromise — is never examined because it sits outside the corporate security perimeter.&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;What Australian organisations should do this week:&lt;/strong&gt;&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;&lt;strong&gt;Audit edge device exposure:&lt;/strong&gt; Survey which router models remote workers are using. TP-Link devices — particularly older models running unpatched firmware — should be prioritised for immediate firmware updates or replacement. Require workers to confirm their home router firmware is current, or consider supplying managed routers to high-risk employees (executives, IT administrators, privileged users).&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Enforce zero-trust principles at the VPN boundary:&lt;/strong&gt; Do not treat inbound VPN connections as inherently trusted. Apply MFA, device health checks, and session monitoring to all remote access, regardless of the connecting IP address. A compromised home router does not automatically compromise a well-enforced zero-trust access policy.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Review network device visibility:&lt;/strong&gt; If your organisation manages its own network hardware — branch office routers, SD-WAN appliances, firewalls — ensure firmware patching is on a defined schedule and that configuration integrity monitoring is in place. APT28 and similar actors exploit the gap between when a patch is released and when it is applied.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Threat hunt for anomalous proxy behaviour:&lt;/strong&gt; If you have network detection capabilities, look for patterns consistent with residential IP addresses making unusual volumes of authentication attempts or accessing sensitive internal resources. Compromised routers used as proxies can produce subtle but detectable traffic anomalies.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Engage your ISP:&lt;/strong&gt; Australian ISPs, in coordination with the ASD, have existing frameworks for alerting customers to compromised devices. If you operate a managed security service or have ISP-level visibility, check whether any flagged device notifications have been issued to your users.&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;The Australian Signals Directorate (ASD) and the ACSC have consistently warned that state-sponsored actors target Australian networks, and APT28 is specifically named in ASD advisories. This week's reporting from Germany and the US confirms the campaign is active and the tradecraft is mature. The remediation window is now.&lt;/p&gt; 
 &lt;h2&gt;Key Takeaways&lt;/h2&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Audit remote workers' router models immediately — TP-Link devices running unpatched firmware are active targets for APT28 espionage infrastructure.&lt;/li&gt; 
  &lt;li&gt;Apply zero-trust access controls at your VPN and remote access boundary; a compromised home router does not need to mean a compromised corporate network.&lt;/li&gt; 
  &lt;li&gt;Schedule firmware patching for all organisation-managed network devices on a defined cadence — APT28 exploits the gap between patch release and application.&lt;/li&gt; 
  &lt;li&gt;Consider supplying managed, IT-configured routers to high-privilege remote workers such as executives, system administrators, and anyone with access to sensitive systems.&lt;/li&gt; 
 &lt;/ul&gt;  
 &lt;p&gt;If you need help assessing your remote access architecture or edge device exposure, SALTT Technologies' Security Architecture &amp;amp; Engineering and CyberOps Management teams work with Australian organisations to close exactly these gaps — contact us to discuss your environment.&lt;/p&gt;   
 &lt;strong&gt;Sources&lt;/strong&gt; 
 &lt;ul&gt; 
  &lt;li&gt;&lt;a href="https://www.itnews.com.au/news/fbi-remotely-patched-privately-owned-routers-to-evict-russian-gru-spies-624880"&gt;FBI remotely patched privately-owned routers to evict Russian GRU spies — iTnews&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.itnews.com.au/news/german-intelligence-agency-warns-of-russian-apt28-cyber-spying-624879"&gt;German intelligence agency warns of Russian APT28 cyber spying — iTnews&lt;/a&gt;&lt;/li&gt; 
 &lt;/ul&gt;  
&lt;/div&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fblog%2Fweekly-cyber-brief-2026-04-13&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>APT</category>
      <pubDate>Sun, 12 Apr 2026 07:43:11 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/blog/weekly-cyber-brief-2026-04-13</guid>
      <dc:date>2026-04-12T07:43:11Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>BitUnlocker: A deep technical analysis of a full‑volume encryption bypass and what it means for BitLocker threat models</title>
      <link>http://www.saltt.tech/insights/bitunlocker-a-deep-technical-analysis-of-a-full-volume-encryption-bypass-and-what-it-means-for-bitlocker-threat-models</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/bitunlocker-a-deep-technical-analysis-of-a-full-volume-encryption-bypass-and-what-it-means-for-bitlocker-threat-models" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/The%20image%20depicts%20a%20hightech%20secure%20office%20environment%20filled%20with%20advanced%20computing%20equipment%20In%20the%20foreground%20a%20sleek%20desktop%20computer%20is%20prominently%20displayed%20its%20screen%20showcasing%20a%20complex%20graphical%20interface%20filled%20with%20graphs%20and%20data%20analyt.png" alt="BitUnlocker: A deep technical analysis of a full‑volume encryption bypass and what it means for BitLocker threat models" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; Microsoft researchers have reported a technique, informally dubbed “BitUnlocker”, that enables bypass of BitLocker full volume encryption under specific boot and recovery pre‑conditions. While the discovery appears to require physical access and a particular environmental setup, it is nevertheless a critical reminder that pre‑boot trust, measured boot, and protector selection are the true control points for BitLocker security. This analysis distils the technical implications for engineers, correlates them with known classes of BitLocker bypass (including Secure Boot and WinRE issues), and outlines concrete hardening, detection, and validation steps. &amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;What Microsoft reported and why it matters&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;According to reporting by iTnews, Microsoft researchers identified a technique—referred to in coverage as “BitUnlocker”—that can bypass BitLocker full volume encryption on affected configurations by manipulating early‑boot conditions and recovery flows to cause the release or re‑use of protected keys without the expected pre‑boot challenge. See the iTnews coverage for the public summary and context: https://www.itnews.com.au/news/bitunlocker-full-volume-encryption-bypass-found-by-microsoft-researchers-619577. While specifics are tightly scoped, the technique belongs to a family of issues where the integrity of the boot chain, recovery environment, or device sleep/hibernate handling can subvert the assumptions BitLocker makes when sealing keys to platform state.&lt;/p&gt; 
&lt;p&gt;This is significant because BitLocker’s security is not solely about cryptography—it is anchored to platform integrity (TPM PCRs, Secure Boot), pre‑boot authentication, and policy. If an attacker can induce a boot path that is still considered trustworthy by the platform (e.g., a signed but vulnerable or misconfigured component, or a legitimate recovery flow that was not hardened), the TPM may release the Volume Master Key (VMK) to the OS loader, effectively defeating “at rest” assurances. For threat modelling, this pushes focus to ensuring the boot/recovery chain is measured, revocation lists are current, and that additional protectors (TPM+PIN) are in place on high‑risk devices. See Microsoft’s BitLocker overview and threat model foundations: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;How BitLocker actually protects keys: TPM sealing, protectors, and measured boot&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;BitLocker protects data by encrypting volume sectors with a Full Volume Encryption Key (FVEK) that is encrypted by a Volume Master Key (VMK). At boot, one or more protectors are used to decrypt the VMK: TPM‑only (keys sealed to PCRs), TPM+PIN, TPM+USB key, or recovery key/password. The Trusted Platform Module (TPM) releases the secret only if the current Platform Configuration Registers (PCRs) match the profile that was defined when BitLocker was provisioned. Typical Windows PCR bindings include measurements of firmware, the boot manager, and Secure Boot state. Refer to the BitLocker technical overview: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-how-it-works and BitLocker group policy details: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings.&lt;/p&gt; 
&lt;p&gt;Measured Boot and Secure Boot are foundational. Secure Boot ensures only signed, non‑revoked boot components execute; Measured Boot records the executed code into the TPM’s PCRs. BitLocker’s TPM‑only protector succeeds when the measured components and Secure Boot state match the expected PCR profile. Any attacker who can: (a) execute a Microsoft‑signed but vulnerable boot component that still measures to an acceptable PCR profile, (b) abuse a recovery path with permissive defaults, or (c) leverage sleep/hibernate states to reuse an already‑released VMK, can potentially subvert BitLocker’s pre‑boot assurance. See Microsoft Secure Boot guidance: https://learn.microsoft.com/windows/security/information-protection/secure-boot/secure-boot-overview and NIST SP 800‑164 Rev.2 for platform integrity: https://csrc.nist.gov/publications/detail/sp/800-164/rev-2/final.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Where bypasses tend to emerge: boot chain, WinRE, and sleep/hibernate edge cases&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Historically, the most robust BitLocker compromises have not broken AES or the on‑disk format but have targeted pre‑boot trust or key residency. Two prominent vectors are: (1) early‑boot component abuse (e.g., loading a signed but exploitable bootloader/boot manager to execute arbitrary code prior to OS), and (2) recovery environment misuse, where WinRE or similar flows automatically unlock or provide a path to offline access under certain policy misconfigurations. Microsoft has previously addressed adjacent issues with Secure Boot revocation updates and WinRE patching guidance to close down bypass routes. For example, see MSRC CVE‑2024‑20666 (Windows BitLocker Security Feature Bypass): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666 and Microsoft’s WinRE update guidance for deployed devices: https://learn.microsoft.com/windows/deployment/update/winre.&lt;/p&gt; 
&lt;p&gt;A separate class of issues arises when the device is in S3 sleep, Modern Standby (S0ix), or hibernation. Once the VMK has been released to RAM, physical attacks such as cold boot can extract remnants of keys, and DMA attacks can read memory if kernel DMA protection is absent or misconfigured. These are not cryptographic failures but operational ones—BitLocker assumes that once unlocked, residual risk is managed by the platform. Engineers should therefore ensure kernel DMA protection is enabled and consider policies to clear TPM keys on sleep or to use pre‑boot authentication to force a user challenge post‑sleep. See Microsoft Kernel DMA Protection guidance: https://learn.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt and F‑Secure’s analysis of cold boot techniques: https://labs.f-secure.com/blog/cold-boot-attacks-are-back/.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Threat model and prerequisites: what an attacker usually needs&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Full volume encryption bypasses of the type suggested by “BitUnlocker” almost always require significant prerequisites: physical access, the ability to reboot the device, control over boot media or recovery flows, and either permissive platform state (e.g., outdated DBX revocation list, insecure BootOrder) or a policy that allows recovery environments to mount encrypted volumes without a user challenge. In some enterprise deployments, consumer‑grade Device Encryption (TPM‑only without a pre‑boot PIN) increases exposure by relying entirely on platform integrity and user presence at the Windows logon stage rather than at pre‑boot. See Device Encryption vs BitLocker distinctions: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/device-encryption.&lt;/p&gt; 
&lt;p&gt;By contrast, configurations using TPM+PIN and verified Secure Boot with a current revocation list substantially raise the bar. Changing boot chain components, shifting to an untrusted WinRE, or introducing vulnerable signed loaders should trip PCR mismatches and force the recovery key, which is typically not available to an opportunistic attacker. The most successful adversaries here are “evil‑maid” attackers with repeated hands‑on time, or well‑resourced actors chaining bootloader vulnerabilities (e.g., the BlackLotus lineage, addressed via certificate revocations) to preserve PCR acceptance while executing arbitrary code. Engineers should treat these as “assume physical access” scenarios and design controls accordingly. For platform integrity background, see NIST SP 800‑155: https://csrc.nist.gov/publications/detail/sp/800-155/final and NIST SP 800‑147: https://csrc.nist.gov/publications/detail/sp/800-147/final.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Technical mechanics: PCR binding, Secure Boot revocations, and recovery policy interactions&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;In TPM‑only deployments, the VMK is sealed to a PCR profile that usually includes PCR[7] (Secure Boot policy) and other PCRs for firmware and boot manager stages. If an attacker can craft a boot path that: (a) remains signed and not revoked (thus, Secure Boot accepts it), and (b) does not alter the PCRs beyond the accepted deltas, the TPM will unseal the VMK to the OS loader. Historically, this has been attempted by bootstrapping older, vulnerable Microsoft‑signed components, which is why revocation updates (DBX) are critical. Administrative policy can also alter the PCR profile to exclude certain measurements (e.g., for compatibility), weakening the binding. See Microsoft guidance on BitLocker PCRs and platform validation considerations within the BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview (section: Platform validation and TPM).&lt;/p&gt; 
&lt;p&gt;WinRE introduces another axis. Depending on how recovery is invoked and how the image is built, it may inherit trust sufficient to mount encrypted volumes—especially if the environment is legitimate but not fully updated or if the deployment uses convenience features that auto‑unlock OS volumes for repair. Microsoft has published multiple advisories and guidance to update WinRE images on deployed devices to address security issues and harden behaviour (see https://learn.microsoft.com/windows/deployment/update/winre). Failing to keep WinRE current or allowing unsigned, sideloaded recovery images can result in a recovery path that effectively bypasses the intended pre‑boot challenge.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Detection and DFIR: what to log, how to investigate, and artefacts to preserve&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;From a detection standpoint, focus on events around boot, BitLocker protector changes, and WinRE entry. Windows logs BitLocker activity under the Microsoft‑Windows‑BitLocker‑Driver provider; look for events indicating protector addition/removal, recovery usage, or auto‑unlock behaviour. Boot integrity events (e.g., under Microsoft‑Windows‑Kernel‑Boot and CodeIntegrity/Operational) can reveal Secure Boot state changes or unexpected boot path components. Where Microsoft Defender for Endpoint (MDE) is present, configure alerts for boot configuration changes, new boot entries (BCDEdit modifications), and WinRE image tampering. Reference: BitLocker operations and GPO auditing in BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings.&lt;/p&gt; 
&lt;p&gt;DFIR should acquire: (1) UEFI NVRAM variables (db, dbx, boot order), (2) the WinRE WIM and its signature metadata, (3) BCD stores (both system and recovery), (4) the BitLocker metadata (FVE metadata), and (5) memory if the device was captured in an unlocked state. If the volume was unlocked at collection time, keys may be recoverable from RAM; preserve the hibernation file (hiberfil.sys) and pagefile if feasible for post‑mortem key hunting. While specific third‑party tooling varies, the key point is to document whether the VMK was unsealed during incident handling. Compare PCR quotes across boots if Remote Attestation is in use (e.g., via TPM attestation APIs) to detect drift in measured components. For background on cold boot forensics and risks of key residency, see F‑Secure’s analysis: https://labs.f-secure.com/blog/cold-boot-attacks-are-back/.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Hardening: concrete mitigations that materially reduce risk&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;The most impactful mitigations are: (1) enforce TPM+PIN for portable endpoints and all devices at elevated risk; (2) ensure Secure Boot is enabled with an up‑to‑date DBX revocation list; (3) keep WinRE images patched per Microsoft guidance; (4) disable or strictly control external boot; (5) enable Kernel DMA Protection; and (6) manage sleep/hibernate behaviour so that keys are not left resident in RAM in unattended contexts. Microsoft’s BitLocker countermeasures page captures many of these programme‑level controls: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-countermeasures and WinRE update guidance for deployed devices: https://learn.microsoft.com/windows/deployment/update/winre.&lt;/p&gt; 
&lt;p&gt;For high‑sensitivity systems, add: pre‑boot authentication with complex PINs; configure the TPM platform validation profile to include critical PCRs; disable hibernate, and require power‑on authentication after sleep; enforce WDAC for boot‑time components; and rotate recovery keys periodically. Avoid hardware self‑encrypting drive (SED) “opportunistic” offload unless explicitly validated; multiple SEDs have had firmware weaknesses that bypassed hardware encryption enforcement. The Radboud University study on SED vulnerabilities remains a cautionary tale: https://www.ru.nl/en/news/radboud-university-finds-vulnerabilities-in-self-encrypting-ssd.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Engineering validation: how to test your fleet for exposure&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Validation should be hands‑on and automated. In a lab, confirm that altering any early‑boot component (e.g., temporarily toggling Secure Boot, introducing an out‑of‑date bootloader, or booting into a stock WinRE) triggers BitLocker recovery on TPM‑only devices; if it does not, investigate PCR binding and policy. Verify DBX currency with PowerShell (e.g., confirm presence of recent Secure Boot revocations) and test that unauthorised external boot media are blocked. Ensure that recovery images are signed and updated and that custom WinRE images do not silently auto‑mount the OS volume. Reference Secure Boot overview and administrative controls: https://learn.microsoft.com/windows/security/information-protection/secure-boot/secure-boot-overview.&lt;/p&gt; 
&lt;p&gt;At scale, use configuration compliance (e.g., Microsoft Intune or Group Policy) to assert: Secure Boot = enabled, DMA Protection = on, BitLocker = enabled with TPM+PIN for mobiles, hibernate policies = hardened, external boot = disabled, and BitLocker network unlock disabled unless strictly necessary. Telemetry should track BitLocker protector inventory per device, recent recovery triggers, and WinRE version drift versus a golden baseline. For programme documentation and policy references, see Microsoft BitLocker GPO settings: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings and Device Encryption vs. BitLocker design notes: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/device-encryption.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Programme governance: policy, keys, and lifecycle operations&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Governance should mandate: pre‑boot auth for defined device classes; scheduled WinRE maintenance; DBX revocation updates as a change‑managed process; and mandatory rotation of BitLocker recovery keys after any recovery event or platform‑state anomaly. Recovery keys must be escrowed in secure directories (e.g., Azure AD/Entra ID or Active Directory) with access logging and PAM controls, and their retrieval should be a privileged, audited workflow. See BitLocker key protection and enterprise management considerations within the BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview.&lt;/p&gt; 
&lt;p&gt;Establish an attestation baseline: record PCR composites, Secure Boot state, and boot component versions for standard images; configure alerting on drift. For vendors, demand UEFI updates and revocation distribution SLAs. Finally, include sleep/hibernate policy as part of risk acceptance: devices handling regulated data should clear keys on sleep or require pre‑boot challenges upon resume. Align with NIST SP 800‑164 Rev.2 for ongoing platform integrity management: https://csrc.nist.gov/publications/detail/sp/800-164/rev-2/final.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Putting it all together: practical 30/60/90‑day actions&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;30 days: inventory BitLocker protector types; enforce TPM+PIN for high‑risk devices; verify Secure Boot is enabled; audit and update WinRE images fleet‑wide; validate Kernel DMA Protection; and block external boot. Publish guidance for incident responders on preserving boot artefacts and RAM when encountering suspected BitLocker bypasses. Reference: BitLocker countermeasures programme: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-countermeasures and WinRE update process: https://learn.microsoft.com/windows/deployment/update/winre.&lt;/p&gt; 
&lt;p&gt;60 days: complete DBX revocation validation; implement automated compliance checks (MDE/Intune/GPO) for boot integrity, DMA, sleep/hibernate policies, and protector types; rotate recovery keys where recovery has occurred; and roll out attestation baselining for PCRs. 90 days: require pre‑boot authentication for mobiles and privileged endpoints; codify a recurring WinRE and firmware maintenance window; and run red‑team tabletop/lab exercises to verify that boot/recovery manipulations consistently lead to recovery prompts, never silent unlock.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/bitunlocker-a-deep-technical-analysis-of-a-full-volume-encryption-bypass-and-what-it-means-for-bitlocker-threat-models" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/AI-Generated%20Media/Images/The%20image%20depicts%20a%20hightech%20secure%20office%20environment%20filled%20with%20advanced%20computing%20equipment%20In%20the%20foreground%20a%20sleek%20desktop%20computer%20is%20prominently%20displayed%20its%20screen%20showcasing%20a%20complex%20graphical%20interface%20filled%20with%20graphs%20and%20data%20analyt.png" alt="BitUnlocker: A deep technical analysis of a full‑volume encryption bypass and what it means for BitLocker threat models" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; Microsoft researchers have reported a technique, informally dubbed “BitUnlocker”, that enables bypass of BitLocker full volume encryption under specific boot and recovery pre‑conditions. While the discovery appears to require physical access and a particular environmental setup, it is nevertheless a critical reminder that pre‑boot trust, measured boot, and protector selection are the true control points for BitLocker security. This analysis distils the technical implications for engineers, correlates them with known classes of BitLocker bypass (including Secure Boot and WinRE issues), and outlines concrete hardening, detection, and validation steps. &amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;What Microsoft reported and why it matters&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;According to reporting by iTnews, Microsoft researchers identified a technique—referred to in coverage as “BitUnlocker”—that can bypass BitLocker full volume encryption on affected configurations by manipulating early‑boot conditions and recovery flows to cause the release or re‑use of protected keys without the expected pre‑boot challenge. See the iTnews coverage for the public summary and context: https://www.itnews.com.au/news/bitunlocker-full-volume-encryption-bypass-found-by-microsoft-researchers-619577. While specifics are tightly scoped, the technique belongs to a family of issues where the integrity of the boot chain, recovery environment, or device sleep/hibernate handling can subvert the assumptions BitLocker makes when sealing keys to platform state.&lt;/p&gt; 
&lt;p&gt;This is significant because BitLocker’s security is not solely about cryptography—it is anchored to platform integrity (TPM PCRs, Secure Boot), pre‑boot authentication, and policy. If an attacker can induce a boot path that is still considered trustworthy by the platform (e.g., a signed but vulnerable or misconfigured component, or a legitimate recovery flow that was not hardened), the TPM may release the Volume Master Key (VMK) to the OS loader, effectively defeating “at rest” assurances. For threat modelling, this pushes focus to ensuring the boot/recovery chain is measured, revocation lists are current, and that additional protectors (TPM+PIN) are in place on high‑risk devices. See Microsoft’s BitLocker overview and threat model foundations: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;How BitLocker actually protects keys: TPM sealing, protectors, and measured boot&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;BitLocker protects data by encrypting volume sectors with a Full Volume Encryption Key (FVEK) that is encrypted by a Volume Master Key (VMK). At boot, one or more protectors are used to decrypt the VMK: TPM‑only (keys sealed to PCRs), TPM+PIN, TPM+USB key, or recovery key/password. The Trusted Platform Module (TPM) releases the secret only if the current Platform Configuration Registers (PCRs) match the profile that was defined when BitLocker was provisioned. Typical Windows PCR bindings include measurements of firmware, the boot manager, and Secure Boot state. Refer to the BitLocker technical overview: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-how-it-works and BitLocker group policy details: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings.&lt;/p&gt; 
&lt;p&gt;Measured Boot and Secure Boot are foundational. Secure Boot ensures only signed, non‑revoked boot components execute; Measured Boot records the executed code into the TPM’s PCRs. BitLocker’s TPM‑only protector succeeds when the measured components and Secure Boot state match the expected PCR profile. Any attacker who can: (a) execute a Microsoft‑signed but vulnerable boot component that still measures to an acceptable PCR profile, (b) abuse a recovery path with permissive defaults, or (c) leverage sleep/hibernate states to reuse an already‑released VMK, can potentially subvert BitLocker’s pre‑boot assurance. See Microsoft Secure Boot guidance: https://learn.microsoft.com/windows/security/information-protection/secure-boot/secure-boot-overview and NIST SP 800‑164 Rev.2 for platform integrity: https://csrc.nist.gov/publications/detail/sp/800-164/rev-2/final.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Where bypasses tend to emerge: boot chain, WinRE, and sleep/hibernate edge cases&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Historically, the most robust BitLocker compromises have not broken AES or the on‑disk format but have targeted pre‑boot trust or key residency. Two prominent vectors are: (1) early‑boot component abuse (e.g., loading a signed but exploitable bootloader/boot manager to execute arbitrary code prior to OS), and (2) recovery environment misuse, where WinRE or similar flows automatically unlock or provide a path to offline access under certain policy misconfigurations. Microsoft has previously addressed adjacent issues with Secure Boot revocation updates and WinRE patching guidance to close down bypass routes. For example, see MSRC CVE‑2024‑20666 (Windows BitLocker Security Feature Bypass): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666 and Microsoft’s WinRE update guidance for deployed devices: https://learn.microsoft.com/windows/deployment/update/winre.&lt;/p&gt; 
&lt;p&gt;A separate class of issues arises when the device is in S3 sleep, Modern Standby (S0ix), or hibernation. Once the VMK has been released to RAM, physical attacks such as cold boot can extract remnants of keys, and DMA attacks can read memory if kernel DMA protection is absent or misconfigured. These are not cryptographic failures but operational ones—BitLocker assumes that once unlocked, residual risk is managed by the platform. Engineers should therefore ensure kernel DMA protection is enabled and consider policies to clear TPM keys on sleep or to use pre‑boot authentication to force a user challenge post‑sleep. See Microsoft Kernel DMA Protection guidance: https://learn.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt and F‑Secure’s analysis of cold boot techniques: https://labs.f-secure.com/blog/cold-boot-attacks-are-back/.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Threat model and prerequisites: what an attacker usually needs&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Full volume encryption bypasses of the type suggested by “BitUnlocker” almost always require significant prerequisites: physical access, the ability to reboot the device, control over boot media or recovery flows, and either permissive platform state (e.g., outdated DBX revocation list, insecure BootOrder) or a policy that allows recovery environments to mount encrypted volumes without a user challenge. In some enterprise deployments, consumer‑grade Device Encryption (TPM‑only without a pre‑boot PIN) increases exposure by relying entirely on platform integrity and user presence at the Windows logon stage rather than at pre‑boot. See Device Encryption vs BitLocker distinctions: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/device-encryption.&lt;/p&gt; 
&lt;p&gt;By contrast, configurations using TPM+PIN and verified Secure Boot with a current revocation list substantially raise the bar. Changing boot chain components, shifting to an untrusted WinRE, or introducing vulnerable signed loaders should trip PCR mismatches and force the recovery key, which is typically not available to an opportunistic attacker. The most successful adversaries here are “evil‑maid” attackers with repeated hands‑on time, or well‑resourced actors chaining bootloader vulnerabilities (e.g., the BlackLotus lineage, addressed via certificate revocations) to preserve PCR acceptance while executing arbitrary code. Engineers should treat these as “assume physical access” scenarios and design controls accordingly. For platform integrity background, see NIST SP 800‑155: https://csrc.nist.gov/publications/detail/sp/800-155/final and NIST SP 800‑147: https://csrc.nist.gov/publications/detail/sp/800-147/final.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Technical mechanics: PCR binding, Secure Boot revocations, and recovery policy interactions&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;In TPM‑only deployments, the VMK is sealed to a PCR profile that usually includes PCR[7] (Secure Boot policy) and other PCRs for firmware and boot manager stages. If an attacker can craft a boot path that: (a) remains signed and not revoked (thus, Secure Boot accepts it), and (b) does not alter the PCRs beyond the accepted deltas, the TPM will unseal the VMK to the OS loader. Historically, this has been attempted by bootstrapping older, vulnerable Microsoft‑signed components, which is why revocation updates (DBX) are critical. Administrative policy can also alter the PCR profile to exclude certain measurements (e.g., for compatibility), weakening the binding. See Microsoft guidance on BitLocker PCRs and platform validation considerations within the BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview (section: Platform validation and TPM).&lt;/p&gt; 
&lt;p&gt;WinRE introduces another axis. Depending on how recovery is invoked and how the image is built, it may inherit trust sufficient to mount encrypted volumes—especially if the environment is legitimate but not fully updated or if the deployment uses convenience features that auto‑unlock OS volumes for repair. Microsoft has published multiple advisories and guidance to update WinRE images on deployed devices to address security issues and harden behaviour (see https://learn.microsoft.com/windows/deployment/update/winre). Failing to keep WinRE current or allowing unsigned, sideloaded recovery images can result in a recovery path that effectively bypasses the intended pre‑boot challenge.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Detection and DFIR: what to log, how to investigate, and artefacts to preserve&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;From a detection standpoint, focus on events around boot, BitLocker protector changes, and WinRE entry. Windows logs BitLocker activity under the Microsoft‑Windows‑BitLocker‑Driver provider; look for events indicating protector addition/removal, recovery usage, or auto‑unlock behaviour. Boot integrity events (e.g., under Microsoft‑Windows‑Kernel‑Boot and CodeIntegrity/Operational) can reveal Secure Boot state changes or unexpected boot path components. Where Microsoft Defender for Endpoint (MDE) is present, configure alerts for boot configuration changes, new boot entries (BCDEdit modifications), and WinRE image tampering. Reference: BitLocker operations and GPO auditing in BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings.&lt;/p&gt; 
&lt;p&gt;DFIR should acquire: (1) UEFI NVRAM variables (db, dbx, boot order), (2) the WinRE WIM and its signature metadata, (3) BCD stores (both system and recovery), (4) the BitLocker metadata (FVE metadata), and (5) memory if the device was captured in an unlocked state. If the volume was unlocked at collection time, keys may be recoverable from RAM; preserve the hibernation file (hiberfil.sys) and pagefile if feasible for post‑mortem key hunting. While specific third‑party tooling varies, the key point is to document whether the VMK was unsealed during incident handling. Compare PCR quotes across boots if Remote Attestation is in use (e.g., via TPM attestation APIs) to detect drift in measured components. For background on cold boot forensics and risks of key residency, see F‑Secure’s analysis: https://labs.f-secure.com/blog/cold-boot-attacks-are-back/.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Hardening: concrete mitigations that materially reduce risk&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;The most impactful mitigations are: (1) enforce TPM+PIN for portable endpoints and all devices at elevated risk; (2) ensure Secure Boot is enabled with an up‑to‑date DBX revocation list; (3) keep WinRE images patched per Microsoft guidance; (4) disable or strictly control external boot; (5) enable Kernel DMA Protection; and (6) manage sleep/hibernate behaviour so that keys are not left resident in RAM in unattended contexts. Microsoft’s BitLocker countermeasures page captures many of these programme‑level controls: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-countermeasures and WinRE update guidance for deployed devices: https://learn.microsoft.com/windows/deployment/update/winre.&lt;/p&gt; 
&lt;p&gt;For high‑sensitivity systems, add: pre‑boot authentication with complex PINs; configure the TPM platform validation profile to include critical PCRs; disable hibernate, and require power‑on authentication after sleep; enforce WDAC for boot‑time components; and rotate recovery keys periodically. Avoid hardware self‑encrypting drive (SED) “opportunistic” offload unless explicitly validated; multiple SEDs have had firmware weaknesses that bypassed hardware encryption enforcement. The Radboud University study on SED vulnerabilities remains a cautionary tale: https://www.ru.nl/en/news/radboud-university-finds-vulnerabilities-in-self-encrypting-ssd.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Engineering validation: how to test your fleet for exposure&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Validation should be hands‑on and automated. In a lab, confirm that altering any early‑boot component (e.g., temporarily toggling Secure Boot, introducing an out‑of‑date bootloader, or booting into a stock WinRE) triggers BitLocker recovery on TPM‑only devices; if it does not, investigate PCR binding and policy. Verify DBX currency with PowerShell (e.g., confirm presence of recent Secure Boot revocations) and test that unauthorised external boot media are blocked. Ensure that recovery images are signed and updated and that custom WinRE images do not silently auto‑mount the OS volume. Reference Secure Boot overview and administrative controls: https://learn.microsoft.com/windows/security/information-protection/secure-boot/secure-boot-overview.&lt;/p&gt; 
&lt;p&gt;At scale, use configuration compliance (e.g., Microsoft Intune or Group Policy) to assert: Secure Boot = enabled, DMA Protection = on, BitLocker = enabled with TPM+PIN for mobiles, hibernate policies = hardened, external boot = disabled, and BitLocker network unlock disabled unless strictly necessary. Telemetry should track BitLocker protector inventory per device, recent recovery triggers, and WinRE version drift versus a golden baseline. For programme documentation and policy references, see Microsoft BitLocker GPO settings: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings and Device Encryption vs. BitLocker design notes: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/device-encryption.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Programme governance: policy, keys, and lifecycle operations&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;Governance should mandate: pre‑boot auth for defined device classes; scheduled WinRE maintenance; DBX revocation updates as a change‑managed process; and mandatory rotation of BitLocker recovery keys after any recovery event or platform‑state anomaly. Recovery keys must be escrowed in secure directories (e.g., Azure AD/Entra ID or Active Directory) with access logging and PAM controls, and their retrieval should be a privileged, audited workflow. See BitLocker key protection and enterprise management considerations within the BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview.&lt;/p&gt; 
&lt;p&gt;Establish an attestation baseline: record PCR composites, Secure Boot state, and boot component versions for standard images; configure alerting on drift. For vendors, demand UEFI updates and revocation distribution SLAs. Finally, include sleep/hibernate policy as part of risk acceptance: devices handling regulated data should clear keys on sleep or require pre‑boot challenges upon resume. Align with NIST SP 800‑164 Rev.2 for ongoing platform integrity management: https://csrc.nist.gov/publications/detail/sp/800-164/rev-2/final.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Putting it all together: practical 30/60/90‑day actions&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt; 
&lt;p&gt;30 days: inventory BitLocker protector types; enforce TPM+PIN for high‑risk devices; verify Secure Boot is enabled; audit and update WinRE images fleet‑wide; validate Kernel DMA Protection; and block external boot. Publish guidance for incident responders on preserving boot artefacts and RAM when encountering suspected BitLocker bypasses. Reference: BitLocker countermeasures programme: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-countermeasures and WinRE update process: https://learn.microsoft.com/windows/deployment/update/winre.&lt;/p&gt; 
&lt;p&gt;60 days: complete DBX revocation validation; implement automated compliance checks (MDE/Intune/GPO) for boot integrity, DMA, sleep/hibernate policies, and protector types; rotate recovery keys where recovery has occurred; and roll out attestation baselining for PCRs. 90 days: require pre‑boot authentication for mobiles and privileged endpoints; codify a recurring WinRE and firmware maintenance window; and run red‑team tabletop/lab exercises to verify that boot/recovery manipulations consistently lead to recovery prompts, never silent unlock.&lt;/p&gt;&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fbitunlocker-a-deep-technical-analysis-of-a-full-volume-encryption-bypass-and-what-it-means-for-bitlocker-threat-models&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Fri, 29 Aug 2025 06:44:01 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/bitunlocker-a-deep-technical-analysis-of-a-full-volume-encryption-bypass-and-what-it-means-for-bitlocker-threat-models</guid>
      <dc:date>2025-08-29T06:44:01Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>Defending against the escalating threat of Deepfakes</title>
      <link>http://www.saltt.tech/insights/defending-against-the-escalating-threat-of-deepfakes</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/defending-against-the-escalating-threat-of-deepfakes" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/cso_a_virtual_face_constructed_of_binary_code_artificial_intelligence_digital_identity_deepfakes_by_thinkstock_2400x1600-100812617-large.webp" alt="Defending against the escalating threat of Deepfakes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;Deepfake technology, though impressively innovative, poses serious threats to both individuals and businesses on a global scale. These threats stem primarily from the technology's ability to convincingly mirror one's image, voice, and often, personal demeanour. This ability turns deepfakes into effective tools for cyberattacks, especially in the domain of social engineering. &amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Understanding the Deepfake Phenomenon&lt;/span&gt;&lt;br&gt;&lt;br&gt;Deepfake technology involves the use of artificial intelligence techniques, notably machine learning algorithms, to fabricate or manipulate digital content so as to produce hyper-realistic false data. Often, these are videos or audio files that convincingly impersonate individuals, sometimes internationally recognised personalities. &lt;br&gt;&lt;br&gt;The real concern, however, arises from those malicious actors who capitalise on the technology's power to orchestrate nefarious deeds. These range from misinformation campaigns and public reputation damage, to identity theft and fraud - all potentially catastrophic issues, on both individual and societal levels.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Cybersecurity Threats Posed by Deepfakes&lt;/span&gt;&lt;br&gt;&lt;br&gt;The rapidly evolving landscape of deepfake technology brings with it an escalating wave of cybersecurity threats. There are two broad ways to classify these threats: First, those directed at individuals and their identities, and second, those aimed at public figures and organisations. &lt;br&gt;&lt;br&gt;In the personal domain, deepfake attacks may focus on defrauding or blackmailing individuals. In the realm of organisations, deepfakes can be exploited to tarnish company reputations, disrupt market dynamics, or even compromise security by fooling biometric scanning systems. Furthermore, as with many other cyber threats, deepfakes continue to evolve unpredictably, potentially outpacing prevention and response measures.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Defensive Strategies Against Deepfake Threats&lt;/span&gt;&lt;br&gt;&lt;br&gt;Given the significant and escalating challenges deepfake technology poses, it's necessary for individuals and businesses alike to be proactive in their defensive strategies. The first step in creating a robust defensive system is to promote awareness about deepfakes, their capabilities, and their potential harm. Just as crucial is training staff in recognising potential deepfakes, particularly when they seek to imitate senior personnel or trusted contacts. &lt;br&gt;&lt;br&gt;Furthermore, technical countermeasures are essential which include implementing advanced security architectures able to detect inconsistencies and discrepancies characteristic of deepfakes. These might range from chain-of-trust systems to validate digital content, to machine learning models trained explicitly to detect deepfakes. Lastly, staying abreast with the latest developments in the field of deepfakes can provide early warnings of new threats or vulnerabilities.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/defending-against-the-escalating-threat-of-deepfakes" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/cso_a_virtual_face_constructed_of_binary_code_artificial_intelligence_digital_identity_deepfakes_by_thinkstock_2400x1600-100812617-large.webp" alt="Defending against the escalating threat of Deepfakes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;Deepfake technology, though impressively innovative, poses serious threats to both individuals and businesses on a global scale. These threats stem primarily from the technology's ability to convincingly mirror one's image, voice, and often, personal demeanour. This ability turns deepfakes into effective tools for cyberattacks, especially in the domain of social engineering. &amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Understanding the Deepfake Phenomenon&lt;/span&gt;&lt;br&gt;&lt;br&gt;Deepfake technology involves the use of artificial intelligence techniques, notably machine learning algorithms, to fabricate or manipulate digital content so as to produce hyper-realistic false data. Often, these are videos or audio files that convincingly impersonate individuals, sometimes internationally recognised personalities. &lt;br&gt;&lt;br&gt;The real concern, however, arises from those malicious actors who capitalise on the technology's power to orchestrate nefarious deeds. These range from misinformation campaigns and public reputation damage, to identity theft and fraud - all potentially catastrophic issues, on both individual and societal levels.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Cybersecurity Threats Posed by Deepfakes&lt;/span&gt;&lt;br&gt;&lt;br&gt;The rapidly evolving landscape of deepfake technology brings with it an escalating wave of cybersecurity threats. There are two broad ways to classify these threats: First, those directed at individuals and their identities, and second, those aimed at public figures and organisations. &lt;br&gt;&lt;br&gt;In the personal domain, deepfake attacks may focus on defrauding or blackmailing individuals. In the realm of organisations, deepfakes can be exploited to tarnish company reputations, disrupt market dynamics, or even compromise security by fooling biometric scanning systems. Furthermore, as with many other cyber threats, deepfakes continue to evolve unpredictably, potentially outpacing prevention and response measures.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Defensive Strategies Against Deepfake Threats&lt;/span&gt;&lt;br&gt;&lt;br&gt;Given the significant and escalating challenges deepfake technology poses, it's necessary for individuals and businesses alike to be proactive in their defensive strategies. The first step in creating a robust defensive system is to promote awareness about deepfakes, their capabilities, and their potential harm. Just as crucial is training staff in recognising potential deepfakes, particularly when they seek to imitate senior personnel or trusted contacts. &lt;br&gt;&lt;br&gt;Furthermore, technical countermeasures are essential which include implementing advanced security architectures able to detect inconsistencies and discrepancies characteristic of deepfakes. These might range from chain-of-trust systems to validate digital content, to machine learning models trained explicitly to detect deepfakes. Lastly, staying abreast with the latest developments in the field of deepfakes can provide early warnings of new threats or vulnerabilities.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fdefending-against-the-escalating-threat-of-deepfakes&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Oct 2023 22:32:13 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/defending-against-the-escalating-threat-of-deepfakes</guid>
      <dc:date>2023-10-12T22:32:13Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>Harness Your Inner Cyber Sleuth With KnowBe4's New 'Hack-A-Cat' Game on Roblox</title>
      <link>http://www.saltt.tech/insights/harness-your-inner-cyber-sleuth-with-knowbe4-s-new-hack-a-cat-game-on-roblox</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/harness-your-inner-cyber-sleuth-with-knowbe4-s-new-hack-a-cat-game-on-roblox" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/529c38f8-af07-41fc-a56c-7a1ab95f28b8.jpeg" alt="Harness Your Inner Cyber Sleuth With KnowBe4's New 'Hack-A-Cat' Game on Roblox" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; KnowBe4 has launched an interactive and exciting way to learn cyber security in a relaxed environment, in the form of a game called 'Hack-A-Cat'. The intention is to lighten up the otherwise serious world of cybersecurity and make it more approachable to beginners. The game involves seven challenges based on practical security principles.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Understanding 'Hack-A-Cat'&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;Unlike typical topics covered in KnowBe4’s security awareness training, the 'Hack-A-Cat' game deviates from regular training videos or slide shows. This engaging game empowers users to sharpen their cybersecurity skills and knowledge by completing different challenges preferring a more hands-on approach.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Game on Roblox Platform&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;'Hack-A-Cat' is a part of the Roblox platform, an online game platform and game creation system that allows users to program games and play games created by other users.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Hack-A-Cat Challenges&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;The game encompasses seven challenges derived from practical security principles, granting both newcomers and seasoned professionals an opportunity to learn and reinforce cybersecurity concepts in a fun environment.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Importance of Cybersecurity Education&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;Considering the rising threats in the digital world, the need for cybersecurity education and awareness is greater than ever. 'Hack-A-Cat' offers a novel way to make learning about cybersecurity accessible and enjoyable for all.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/harness-your-inner-cyber-sleuth-with-knowbe4-s-new-hack-a-cat-game-on-roblox" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/529c38f8-af07-41fc-a56c-7a1ab95f28b8.jpeg" alt="Harness Your Inner Cyber Sleuth With KnowBe4's New 'Hack-A-Cat' Game on Roblox" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; KnowBe4 has launched an interactive and exciting way to learn cyber security in a relaxed environment, in the form of a game called 'Hack-A-Cat'. The intention is to lighten up the otherwise serious world of cybersecurity and make it more approachable to beginners. The game involves seven challenges based on practical security principles.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Understanding 'Hack-A-Cat'&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;Unlike typical topics covered in KnowBe4’s security awareness training, the 'Hack-A-Cat' game deviates from regular training videos or slide shows. This engaging game empowers users to sharpen their cybersecurity skills and knowledge by completing different challenges preferring a more hands-on approach.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Game on Roblox Platform&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;'Hack-A-Cat' is a part of the Roblox platform, an online game platform and game creation system that allows users to program games and play games created by other users.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Hack-A-Cat Challenges&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;The game encompasses seven challenges derived from practical security principles, granting both newcomers and seasoned professionals an opportunity to learn and reinforce cybersecurity concepts in a fun environment.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt; 
&lt;span style="font-weight: bold;"&gt;Importance of Cybersecurity Education&lt;/span&gt; 
&lt;br&gt; 
&lt;br&gt;Considering the rising threats in the digital world, the need for cybersecurity education and awareness is greater than ever. 'Hack-A-Cat' offers a novel way to make learning about cybersecurity accessible and enjoyable for all.&amp;nbsp; 
&lt;br&gt; 
&lt;br&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fharness-your-inner-cyber-sleuth-with-knowbe4-s-new-hack-a-cat-game-on-roblox&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 26 Sep 2023 01:02:22 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/harness-your-inner-cyber-sleuth-with-knowbe4-s-new-hack-a-cat-game-on-roblox</guid>
      <dc:date>2023-09-26T01:02:22Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>91% of Cybersecurity Pros Experience AI-Driven Cyber Attacks</title>
      <link>http://www.saltt.tech/insights/91-of-cybersecurity-pros-experience-ai-driven-cyber-attacks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/91-of-cybersecurity-pros-experience-ai-driven-cyber-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/DALL%C2%B7E%202023-09-20%2017.28.33%20-%20cybersecurity%20only%20picture.png" alt="91% of Cybersecurity Pros Experience AI-Driven Cyber Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;Cybersecurity professionals across industries are diligently working to counteract a rising tide of cyber threats powered by next-generation technologies. Notably, artificial intelligence (AI) has been considerably weaponized by cybercriminals, leading to an alarmingly high volume of sophisticated attacks. According to recent data presented by KnowBe4, a cybersecurity awareness training company, a shocking 91% of cybersecurity professionals experienced cyber attacks that use AI in the past year.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;AI-Powered Cyber Threats: The New Norm&lt;/span&gt;&lt;br&gt;&lt;br&gt;The noted figure from KnowBe4's findings reveals a hard truth about the modern cyber threat landscape: AI-driven attacks are no longer an exception but are increasingly becoming the norm. These attacks often blend elements of automation, machine learning, and advanced algorithms, allowing cybercriminals to execute widespread, high-speed, and highly targeted activities that conventional security measures often struggle to counter effectively.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;The Conundrum of AI in Cybersecurity&lt;/span&gt;&lt;br&gt;&lt;br&gt;AI is undoubtedly a double-edged sword in the cybersecurity sector. While there are significant potential benefits to utilizing AI for enhanced security measures and protection, cybercriminals are also exploiting this advanced technology to launch increasingly sophisticated attacks. As a result, the very tool we rely upon to bolster our defenses is turning into a formidable weapon in the hands of online adversaries. This AI paradox poses a monumental challenge for cybersecurity professionals worldwide.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;The Efficacy of Current Defensive Strategies&lt;/span&gt;&lt;br&gt;&lt;br&gt;Understandably, the rise of AI-driven cyber threats brings into question the effectiveness of the current defensive strategies. Are our traditional cybersecurity measures sufficient to combat these AI-powered threats? Disturbingly, the answer seems to lean towards a resounding 'no.' At least for now, our legacy defenses are struggling to keep pace with the threat landscape's evolution.&lt;br&gt;&lt;br&gt;91% of the surveyed professionals who experienced AI-based attacks suggest the urgent need for organizations to reassess and fortify their cybersecurity strategies. It is a strong indicator that the adoption of next-generation cybersecurity technologies has become a necessity rather than an option.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;The Road Ahead: Strengthening Our Cyber Defenses&lt;/span&gt;&lt;br&gt;&lt;br&gt;Remaining one step ahead of cybercriminals is now more crucial than ever. To tackle the rising AI-powered cyber threats effectively, we must ramp up efforts in adopting new, innovative defensive strategies that use advanced technologies like AI and machine learning.&lt;br&gt;&lt;br&gt;Furthermore, organizations across sectors must invest in comprehensive cybersecurity awareness training. Since humans remain the weakest link in cybersecurity, upgrading employees' knowledge and skills can go a long way in countering cyber threats.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Concluding Thoughts&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;br&gt;With the mounting threats of AI-powered cyber attacks, it is high time we rethink our security protocols and elevate our defense capabilities. Diversifying our defensive strategies, adopting next-gen cyber technologies, and investing in cybersecurity education will be fundamental to meet the evolving cyber threats head-on.&lt;br&gt;&lt;br&gt;Remember, cybersecurity is a shared responsibility, and we all have a crucial role to play. Stay safe in the digital world and keep learning, because knowledge is our best defense! Stay tuned for more such updates about the latest developments and trends in cybersecurity.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/91-of-cybersecurity-pros-experience-ai-driven-cyber-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/DALL%C2%B7E%202023-09-20%2017.28.33%20-%20cybersecurity%20only%20picture.png" alt="91% of Cybersecurity Pros Experience AI-Driven Cyber Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;Cybersecurity professionals across industries are diligently working to counteract a rising tide of cyber threats powered by next-generation technologies. Notably, artificial intelligence (AI) has been considerably weaponized by cybercriminals, leading to an alarmingly high volume of sophisticated attacks. According to recent data presented by KnowBe4, a cybersecurity awareness training company, a shocking 91% of cybersecurity professionals experienced cyber attacks that use AI in the past year.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;AI-Powered Cyber Threats: The New Norm&lt;/span&gt;&lt;br&gt;&lt;br&gt;The noted figure from KnowBe4's findings reveals a hard truth about the modern cyber threat landscape: AI-driven attacks are no longer an exception but are increasingly becoming the norm. These attacks often blend elements of automation, machine learning, and advanced algorithms, allowing cybercriminals to execute widespread, high-speed, and highly targeted activities that conventional security measures often struggle to counter effectively.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;The Conundrum of AI in Cybersecurity&lt;/span&gt;&lt;br&gt;&lt;br&gt;AI is undoubtedly a double-edged sword in the cybersecurity sector. While there are significant potential benefits to utilizing AI for enhanced security measures and protection, cybercriminals are also exploiting this advanced technology to launch increasingly sophisticated attacks. As a result, the very tool we rely upon to bolster our defenses is turning into a formidable weapon in the hands of online adversaries. This AI paradox poses a monumental challenge for cybersecurity professionals worldwide.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;The Efficacy of Current Defensive Strategies&lt;/span&gt;&lt;br&gt;&lt;br&gt;Understandably, the rise of AI-driven cyber threats brings into question the effectiveness of the current defensive strategies. Are our traditional cybersecurity measures sufficient to combat these AI-powered threats? Disturbingly, the answer seems to lean towards a resounding 'no.' At least for now, our legacy defenses are struggling to keep pace with the threat landscape's evolution.&lt;br&gt;&lt;br&gt;91% of the surveyed professionals who experienced AI-based attacks suggest the urgent need for organizations to reassess and fortify their cybersecurity strategies. It is a strong indicator that the adoption of next-generation cybersecurity technologies has become a necessity rather than an option.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;The Road Ahead: Strengthening Our Cyber Defenses&lt;/span&gt;&lt;br&gt;&lt;br&gt;Remaining one step ahead of cybercriminals is now more crucial than ever. To tackle the rising AI-powered cyber threats effectively, we must ramp up efforts in adopting new, innovative defensive strategies that use advanced technologies like AI and machine learning.&lt;br&gt;&lt;br&gt;Furthermore, organizations across sectors must invest in comprehensive cybersecurity awareness training. Since humans remain the weakest link in cybersecurity, upgrading employees' knowledge and skills can go a long way in countering cyber threats.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Concluding Thoughts&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;br&gt;With the mounting threats of AI-powered cyber attacks, it is high time we rethink our security protocols and elevate our defense capabilities. Diversifying our defensive strategies, adopting next-gen cyber technologies, and investing in cybersecurity education will be fundamental to meet the evolving cyber threats head-on.&lt;br&gt;&lt;br&gt;Remember, cybersecurity is a shared responsibility, and we all have a crucial role to play. Stay safe in the digital world and keep learning, because knowledge is our best defense! Stay tuned for more such updates about the latest developments and trends in cybersecurity.&lt;/p&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2F91-of-cybersecurity-pros-experience-ai-driven-cyber-attacks&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>Artificial Intelligence</category>
      <pubDate>Wed, 20 Sep 2023 07:29:33 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/91-of-cybersecurity-pros-experience-ai-driven-cyber-attacks</guid>
      <dc:date>2023-09-20T07:29:33Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
    <item>
      <title>Web Application and API protection needs to be cloud delivered</title>
      <link>http://www.saltt.tech/insights/web-application-and-api-protection-needs-to-be-cloud-delivered</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/web-application-and-api-protection-needs-to-be-cloud-delivered" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/Depositphotos_372160590_XS.jpg" alt="Secure Cloud" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="border: none; font-size: 16px;"&gt;&lt;span style="font-family: Helvetica, Arial, sans-serif;"&gt;Web application and API protection is a critical aspect of maintaining the security and integrity of online systems. These systems, which include web applications and APIs, are vulnerable to a variety of cyber threats, such as SQL injection attacks, cross-site scripting (XSS) attacks, and DDoS attacks. To protect against these threats, organisations must implement robust security measures, such as web application firewalls (WAFs), API security gateways, bot detection &amp;amp; fraud mitigation.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.saltt.tech/insights/web-application-and-api-protection-needs-to-be-cloud-delivered" title="" class="hs-featured-image-link"&gt; &lt;img src="https://22457779.fs1.hubspotusercontent-ap1.net/hubfs/22457779/Depositphotos_372160590_XS.jpg" alt="Secure Cloud" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="border: none; font-size: 16px;"&gt;&lt;span style="font-family: Helvetica, Arial, sans-serif;"&gt;Web application and API protection is a critical aspect of maintaining the security and integrity of online systems. These systems, which include web applications and APIs, are vulnerable to a variety of cyber threats, such as SQL injection attacks, cross-site scripting (XSS) attacks, and DDoS attacks. To protect against these threats, organisations must implement robust security measures, such as web application firewalls (WAFs), API security gateways, bot detection &amp;amp; fraud mitigation.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track-ap1.hubspot.com/__ptq.gif?a=22457779&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.saltt.tech%2Finsights%2Fweb-application-and-api-protection-needs-to-be-cloud-delivered&amp;amp;bu=http%253A%252F%252Fwww.saltt.tech%252Finsights&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 09 Jan 2023 04:15:00 GMT</pubDate>
      <guid>http://www.saltt.tech/insights/web-application-and-api-protection-needs-to-be-cloud-delivered</guid>
      <dc:date>2023-01-09T04:15:00Z</dc:date>
      <dc:creator>Nobby</dc:creator>
    </item>
  </channel>
</rss>
