• Understanding NIPRNet: The U.S. Military’s Secure Network Backbone

    The Non-classified Internet Protocol Router Network (NIPRNet) is a foundational element of the U.S. Department of Defense’s global IT infrastructure. Though often misunderstood due to its name, NIPRNet is far more than a basic communications network—it is a mission-critical platform that underpins secure information sharing, operational coordination, and government communications across multiple agencies.


    What Is NIPRNet?

    NIPRNet is the primary network used by the U.S. Department of Defense (DoD) to transmit sensitive but unclassified information. Despite the “non-classified” label, the network supports communications and data access that are vital to national security and defense operations. It is separate from the public internet and built with a strong focus on controlled access and security.

    Originally introduced in 1992, NIPRNet has expanded into a worldwide system that serves millions of users, including DoD employees, other federal agencies, and select international partners. Over time, it has become indispensable to the day-to-day functioning of defense and government operations.


    How NIPRNet Works

    Unlike commercial or public networks, NIPRNet is physically and logically isolated from the internet. It uses encryption, firewalls, strict access controls, and advanced intrusion detection systems to protect its data from interception or unauthorized access. Only credentialed, authorized users can access NIPRNet, and access is often tightly restricted based on clearance levels and organizational roles.

    The network supports a range of services, including secure email, voice and video communication, collaboration platforms, file transfers, and access to internal databases.


    Key Applications of NIPRNet

    NIPRNet is used extensively across defense and government sectors for:

    • Secure Communication: It provides a reliable and safe channel for exchanging operational messages, directives, and status reports using secure email, messaging apps, and video conferencing tools.
    • Information Sharing: The network enables collaboration between military branches, federal agencies, and allied partners by allowing authorized access to mission-relevant data.
    • Database Access: NIPRNet connects users to essential DoD databases, including those for personnel records, medical data, logistics, and more—systems that must remain protected from public exposure.
    • Enterprise Services: It supports a full suite of enterprise IT services such as DNS, directory services, email hosting, and administrative platforms, all operating within a secure perimeter.
    • Joint Operations: During multinational or interagency missions, NIPRNet acts as a trusted bridge for real-time coordination between the DoD, civilian government agencies, and partner nations.

    The Evolution of NIPRNet

    When NIPRNet was first deployed in the early 1990s, it was limited in scope, primarily connecting a small number of military installations. As technology and operational needs evolved, so did the network. Over the last three decades, it has undergone continuous modernization to improve bandwidth, scalability, and cybersecurity protections.

    The network’s architecture now supports cloud-hosted services, distributed access points, and rapid data exchange across geographically dispersed commands. NIPRNet’s resilience and reliability have become more critical than ever in an era where cyber threats are increasingly sophisticated and persistent.


    NIPRNet vs. Other Government Networks

    NIPRNet is often mentioned alongside other key government networks, such as SIPRNet (Secret Internet Protocol Router Network) and JWICS (Joint Worldwide Intelligence Communications System). While SIPRNet handles classified data up to the Secret level, and JWICS supports Top Secret and SCI (Sensitive Compartmented Information) communications, NIPRNet is reserved for unclassified but sensitive operational data.

    Despite handling a lower classification of information, NIPRNet must still meet strict security requirements due to the nature of the data it processes—particularly as more military functions move to digital platforms.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Chrome CVE-2025-4664: Cross-Origin Data Leak Vulnerability Exploited in the Wild

    May 2025 — A newly disclosed Chrome vulnerability tracked as CVE-2025-4664 is drawing urgent attention across the security community. The flaw, identified as a case of insufficient policy enforcement in Chrome’s Loader component, allows attackers to bypass same-origin restrictions and exfiltrate sensitive query parameters to third-party domains. Google released a patch for the issue on May 14, 2025, as part of Chrome version 136.0.7103.113, but the vulnerability has already been actively exploited in the wild.


    What Is CVE-2025-4664?

    CVE-2025-4664 affects how Google Chrome handles the Link HTTP header on sub-resource requests. While most browsers ignore the referrer-policy defined in this context, Chrome uniquely processes it. By setting the referrer-policy to unsafe-url, an attacker can craft a malicious page that forces the browser to include full query parameters in the Referer header when fetching a sub-resource—such as an image—from an attacker-controlled domain.

    This subtle behavior opens the door for cross-origin data leaks. If URLs contain sensitive information in the query string—like session tokens, user IDs, or email addresses—those details can be silently leaked. Although the CVSS v3 score is listed as 4.3 (medium severity), the real-world impact can be far more damaging depending on how developers handle authentication and data in URLs.


    Active Exploitation and Research Disclosure

    The vulnerability was responsibly disclosed by security researcher Vsevolod Kokorin (@slonser_), who also published a proof-of-concept on May 5. Google confirmed that exploits for this vulnerability exist in the wild, though no targeted campaigns have been publicly attributed yet. CVE-2025-4664 follows closely on the heels of another Chrome zero-day, CVE-2025-2783, which was exploited by threat actors earlier this year in espionage operations.


    Mitigation and Patching

    Google’s security update is now available for Windows, macOS, and Linux users running Chrome version 136.0.7103.113 or later. Users of other Chromium-based browsers—including Microsoft Edge, Brave, Opera, and Vivaldi—should also apply security updates as soon as vendors release patches.

    Administrators should verify that Chrome instances across managed environments have been updated and consider implementing enterprise policy controls that restrict outdated versions of the browser. Furthermore, content security policies (CSP) and strict referrer-policy headers should be reviewed and explicitly defined to avoid similar future issues.


    What SOC Teams Need to Know

    Security Operations Center (SOC) teams should prioritize monitoring for potential abuse of this vulnerability, especially in environments where sensitive data may be passed via URL query parameters. While this is typically considered a poor security practice, it remains common in many web applications—making this vulnerability a viable vector for lateral movement or data leakage.

    Analysts should inspect outbound traffic for unusual image or sub-resource requests made to third-party domains that include referrer headers with query strings. Detection rules within SIEM platforms should be updated to log HTTP requests containing sensitive tokens in referer fields—especially requests originating from browser agents tied to Chrome versions prior to 136.0.7103.113.

    Teams should also validate internal web applications for adherence to modern security headers. Sites should avoid using unsafe-url as a default referrer policy and explicitly define strict referrer-policy headers to limit exposure. Developers should be discouraged from placing any sensitive tokens or credentials in the URL path or query string. These should be passed securely using headers or within POST bodies whenever possible.

    In organizations where browser management is part of the IT stack, ensure Chrome auto-updates are enforced and that no legacy Chromium-based browsers are permitted to access sensitive internal applications. With known exploits circulating, unmanaged browser instances may represent a weak point in an otherwise hardened perimeter.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Microsoft May 2025 Patch Tuesday: 72 Flaws Fixed, 5 Zero-Days Exploited

    Microsoft’s May 2025 Patch Tuesday includes security updates for 72 vulnerabilities, featuring five actively exploited zero-days and two additional publicly disclosed flaws. The update also addresses six critical vulnerabilities, five involving remote code execution (RCE) and one classified as an information disclosure issue.


    Breakdown of Vulnerabilities

    The vulnerabilities patched this month fall into the following categories:

    • 17 Elevation of Privilege (EoP) vulnerabilities
    • 28 Remote Code Execution (RCE) vulnerabilities
    • 15 Information Disclosure vulnerabilities
    • 7 Denial of Service (DoS) vulnerabilities
    • 2 Security Feature Bypass vulnerabilities
    • 2 Spoofing vulnerabilities

    This count does not include vulnerabilities related to Azure, Microsoft Edge, Dataverse, or Mariner, which were addressed earlier this month. Non-security updates released include Windows 11 KB5058411 and KB5058405, and Windows 10 KB5058379.


    Zero-Day Vulnerabilities

    This month’s Patch Tuesday addresses five zero-day vulnerabilities confirmed to be actively exploited in the wild:

    CVE-2025-30400 | Microsoft DWM Core Library Elevation of Privilege Vulnerability

    Affects: Windows DWM Core Library
    A use-after-free flaw in the Desktop Window Manager (DWM) allows a local, authorized attacker to elevate privileges to SYSTEM.

    CVE-2025-32701 | Windows Common Log File System Driver Elevation of Privilege Vulnerability

    Affects: Windows Common Log File System Driver
    Use-after-free vulnerability enabling local privilege escalation to SYSTEM.

    CVE-2025-32706 | Windows Common Log File System Driver Elevation of Privilege Vulnerability

    Affects: Same driver as CVE-2025-32701
    This vulnerability stems from improper input validation, allowing local attackers to elevate to SYSTEM.

    CVE-2025-32709 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

    Affects: Ancillary Function Driver for WinSock
    Another use-after-free vulnerability, permitting SYSTEM-level elevation via local exploitation.

    CVE-2025-30397 | Scripting Engine Memory Corruption Vulnerability

    Affects: Microsoft Scripting Engine
    This remote code execution vulnerability arises from a type confusion bug. Exploitation requires tricking a user into clicking a crafted link in Microsoft Edge or Internet Explorer.


    Publicly Disclosed Vulnerabilities

    CVE-2025-26685 | Microsoft Defender for Identity Spoofing Vulnerability

    Affects: Microsoft Defender for Identity
    Allows unauthenticated LAN-based attackers to spoof identities due to improper authentication validation.

    CVE-2025-32702 | Visual Studio Remote Code Execution Vulnerability

    Affects: Visual Studio
    A command injection flaw enabling unauthenticated local RCE through improper handling of special elements in commands.


    Other Critical Vulnerabilities

    In addition to the zero-days, Microsoft patched several critical vulnerabilities this month. Five are remote code execution flaws across key components, and one involves an information disclosure flaw with a high impact rating. Detailed CVE references for these critical issues have not yet been included in Microsoft’s summary documentation, but their classification as critical indicates high potential for system compromise if left unpatched.


    Adobe and Other Vendor Updates

    Several major vendors issued important updates in May 2025:

    • Apple: Released updates for iOS, iPadOS, and macOS
    • Cisco: Patched a maximum severity bug in IOS XE Wireless LAN Controllers
    • Fortinet: Addressed multiple flaws, including an actively exploited zero-day in FortiVoice
    • Google: Fixed 62 Android bugs, including a zero-click RCE in FreeType 2
    • Intel: Published CPU microcode updates to mitigate Branch Privilege Injection, a vulnerability capable of leaking sensitive data from privileged memory
    • SAP: Released updates for multiple products, including critical RCE vulnerabilities
    • SonicWall: Patched a zero-day that had been exploited in active attacks

    Recommendations for Users and Administrators

    Given the scope and severity of the May updates, especially the five actively exploited vulnerabilities, users and administrators should prioritize patching affected Windows systems immediately. Elevated privilege vulnerabilities—particularly those exploited in the wild—pose a significant threat to enterprise environments and should be addressed with urgency.

    Pay special attention to environments running Desktop Window Manager (DWM), systems with network exposure to Edge or Internet Explorer, and any configuration leveraging Microsoft Defender for Identity or Visual Studio. Organizations should validate patch deployment success and closely monitor for any signs of post-exploitation behavior or lateral movement attempts.

    Full patch details and associated guidance can be reviewed in Microsoft’s Security Update Guide.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen: Monday Security Brief (5/12/2024)

    Today’s Topics:

    • LockBit Admin Panel Hacked: Leaked Data Offers Rare Insight into Ransomware Operations
    • Google to Pay $1.375 Billion in Texas Settlement Over Unauthorized Location and Biometric Tracking
    • How can Netizen help?

    LockBit Admin Panel Hacked: Leaked Data Offers Rare Insight into Ransomware Operations

    On May 7, an administration panel belonging to the LockBit ransomware-as-a-service (RaaS) operation was compromised, resulting in the public release of internal communications, attacker infrastructure details, and affiliate negotiation records—information with immediate value to law enforcement, incident response teams, and threat intelligence researchers.

    The attacker defaced a LockBit admin domain with the message: “Don’t do crime, crime is bad xoxo from Prague,” along with a link to a compressed archive containing data extracted from the compromised server. This includes:

    • Bitcoin wallet addresses tied to affiliate transactions
    • Chat logs between affiliates and victims
    • TOX IDs, usernames, and passwords for 76 registered users
    • Indicators of infrastructure, malware, and operational procedures

    Rapid7’s Christiaan Beek confirmed that the Bitcoin wallet addresses could aid law enforcement in tracing transactions and identifying actors involved in LockBit’s affiliate network. Searchlight Cyber’s Luke Donovan reported that 22 of the leaked user accounts were associated with TOX IDs—metadata commonly reused across dark web forums. Researchers were able to correlate some of these to known threat actor aliases, potentially enabling further attribution or linking affiliate activity across campaigns.

    The chat logs—spanning December 2024 to April 2025—expose negotiation tactics in detail. According to Beek, affiliates pressured victims with rapid ransom demands that varied significantly, sometimes requesting amounts as low as $5,000 and in other cases demanding six-figure payments. This range of tactics provides valuable insight for incident responders and negotiators working on live ransomware cases.

    Donovan noted similarities between this attack and a prior defacement of the Everest ransomware group’s infrastructure, suggesting the breach may stem from infighting or retaliation within the cybercriminal ecosystem. Though attribution remains speculative, the reused messaging indicates the same threat actor may be behind both compromises.

    LockBit has acknowledged the breach but claimed no victim data or decryptors were exposed. The group’s figurehead, known as LockBitSupp—identified by law enforcement as Russian national Dmitry Yuryevich Khoroshev—has publicly offered a reward for information on the identity of the attacker responsible.

    While LockBit infrastructure was dealt a significant blow in coordinated takedowns last year, this leak is one of the most substantial windows into their internal operations to date. For security teams and intelligence analysts, the exposed records offer a rare opportunity to better understand affiliate dynamics, operational workflows, and negotiation strategies used in active ransomware campaigns.

    Security teams should review the leaked indicators, monitor for reused TOX IDs or wallet addresses, and remain alert to opportunistic attacks or impersonation attempts stemming from the breach.


    Google to Pay $1.375 Billion in Texas Settlement Over Unauthorized Location and Biometric Tracking

    Google has agreed to pay $1.375 billion to the state of Texas to settle two major lawsuits alleging the unauthorized tracking of users’ physical location and the collection of biometric data, including facial recognition and voiceprints—without user consent. The figure represents the largest privacy-related settlement Google has made with a single U.S. state and far exceeds the amounts it previously paid in similar lawsuits across other jurisdictions.

    Filed in 2022 by Texas Attorney General Ken Paxton, the lawsuits accused Google of violating state privacy laws by tracking users’ movements even when location history was turned off, recording incognito searches, and capturing biometric identifiers such as facial geometry and voice profiles without explicit user permission. These practices were allegedly performed through core services like Google Maps, Search, and Photos.

    “For years, Google secretly tracked people’s movements, private searches, and even their voiceprints and facial geometry through their products and services,” said Attorney General Paxton. “This $1.375 billion settlement is a major win for Texans’ privacy and tells companies that they will pay for abusing our trust.”

    The magnitude of this settlement not only surpasses Google’s $391 million payout to 40 states in 2022, but also its $93 million agreement with California in 2023 and a $29.5 million resolution involving Indiana and Washington. It is on par with the $1.4 billion settlement Meta reached with Texas over similar biometric privacy violations.

    In response to regulatory and public pressure, Google has made incremental privacy changes. These include storing Maps Timeline data locally on users’ devices rather than in the cloud and introducing auto-deletion controls for location data when tracking features are enabled.

    With increasing regulatory scrutiny from both U.S. and international authorities, this settlement further intensifies pressure on Google, which is already facing antitrust calls to break up key areas of its business. Privacy professionals should view this as a signal to review data handling practices—particularly those involving sensitive categories such as biometrics and geolocation—and ensure compliance with both existing and emerging state-level regulations.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Understanding and Implementing Compliance Management Systems in Cybersecurity

    In cybersecurity, a compliance management system (CMS) is more than a risk mitigation tool—it’s the operational framework that helps security teams enforce, monitor, and report on adherence to regulatory mandates, internal policies, and industry standards. A well-structured CMS centralizes processes and controls to reduce non-compliance exposure and integrates directly into broader cybersecurity risk strategies.

    A CMS isn’t a single product or dashboard. It’s a coordinated system of technical tools, procedural workflows, and human oversight that together ensure regulatory alignment. For cybersecurity professionals, it can include policy engines, continuous control monitoring (CCM), vulnerability assessments tied to compliance mandates, and tools for documenting security operations in line with frameworks like NIST, ISO 27001, HIPAA, PCI DSS, and others.


    Why a CMS Matters in Cybersecurity Operations

    Security teams face a sprawling landscape of compliance regulations that evolve with every breach, new technology, and global data transfer law. From GDPR’s data handling rules to sector-specific frameworks like CMMC or SOC 2, keeping up requires more than documentation—it requires constant situational awareness across all systems and users.

    Non-compliance isn’t just a legal problem. It introduces significant operational risk, expands an organization’s attack surface, and often correlates with weak security controls. For example, the gap between regulatory obligations and current system configurations can become an exploitable vulnerability. A CMS offers a structured approach for mapping, implementing, and monitoring compliance-related security controls across distributed environments.


    Key Components of a CMS for Security Teams

    1. Board-Level Buy-In and Executive Accountability
      Executive leadership must signal that security compliance is a strategic business priority. Without top-down pressure, even well-architected CMS programs stall during implementation. Boards and CISOs should align on the business risk of non-compliance and allocate appropriate resources, particularly for incident response, vulnerability disclosure handling, and third-party risk assessments.
    2. Security Compliance Leadership
      This often falls to the CISO, a dedicated compliance officer, or GRC lead. These roles manage the implementation of technical safeguards, policy alignment, audit readiness, and security awareness initiatives across the enterprise. Their task includes ensuring that technical controls map directly to regulatory requirements and that evidence can be produced on demand.
    3. Formalized Compliance Program
      This is the operational side of a CMS. It includes risk assessments, regular control testing, policy documentation, audit logging, security training, and enforcement. In mature environments, the compliance program is built into the security stack—automating reporting, generating alerts for non-compliance events, and enabling continuous compliance monitoring via integrations with SIEMs, vulnerability scanners, and IAM tools.
    4. Consumer Complaint and Incident Intake
      Although more common in consumer-facing environments, this function also applies to enterprise cybersecurity—particularly around breach disclosures, right-to-be-forgotten requests, and DSARs (Data Subject Access Requests). Having structured intake and escalation procedures helps reduce legal risk and aligns with breach notification regulations.
    5. Internal and External Audits
      Audits measure how security controls align with regulatory expectations. Internal audits help security teams identify and close control gaps before external auditors arrive. Mature CMS implementations make audit preparation routine by embedding compliance reporting into daily operations. External audits can validate readiness for certifications or serve as part of vendor assurance efforts.
    6. Continuous Monitoring and Risk Assessment
      Compliance is not static. Continuous monitoring tools—whether from cloud security posture management (CSPM), configuration management databases (CMDBs), or extended detection and response (XDR)—provide real-time insight into drift from compliance baselines. When controls degrade, these systems alert stakeholders and log incidents for forensic and reporting purposes.

    Implementing a CMS: Practical Steps for Security Teams

    • Baseline Requirements: Begin with a gap analysis—compare your current control set to your regulatory obligations. This forms the foundation of your CMS roadmap.
    • Tool Selection: Choose GRC platforms, policy engines, and audit support tools that integrate with your SIEM, identity provider, and cloud environments. API compatibility matters more than UI.
    • Define Ownership: Assign responsibility across teams (IT, legal, HR, dev) for specific compliance objectives. Clarify who maintains control mappings and who handles audit response.
    • Training and Policy Enforcement: Technical controls only go so far without user behavior alignment. Incorporate role-specific security training and automated policy enforcement where possible.
    • Audit Readiness: Maintain documentation of system configurations, access controls, incident response procedures, and prior assessment results. Use dashboards and automated compliance scoring where available.
    • Feedback Loops: Monitor for shifts in the regulatory landscape. Use threat intelligence, vendor updates, and industry groups to anticipate changes and adjust the CMS accordingly.

    Final Thoughts

    For cybersecurity teams, a CMS isn’t optional—it’s essential infrastructure. It ties together regulatory compliance, operational security, and business continuity into one system of accountability. In an era where compliance violations often signal deeper security failings, a properly implemented CMS is one of the strongest defenses against reputational and regulatory damage.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Cisco Patches Critical 10.0 CVE-2025-20188 Vulnerability: What SOC Teams Need to Know

    Cisco has released a critical security update to patch CVE-2025-20188, a zero-click vulnerability with a CVSS score of 10.0 that affects multiple IOS XE Wireless Controller models. The flaw allows unauthenticated remote attackers to upload files and execute arbitrary commands with root privileges on vulnerable devices.


    Key Details of CVE-2025-20188

    The vulnerability stems from a hard-coded JSON Web Token (JWT) embedded within affected systems. If exploited, an attacker could send crafted HTTPS requests to the AP image download interface and perform file uploads, path traversal, and remote code execution with full system control.

    This issue impacts the following Cisco products when running vulnerable firmware and with the Out-of-Band AP Image Download feature enabled:

    • Catalyst 9800-CL Wireless Controllers for Cloud
    • Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
    • Catalyst 9800 Series Wireless Controllers
    • Embedded Wireless Controller on Catalyst Access Points

    Importantly, the Out-of-Band AP Image Download feature is disabled by default, limiting risk for systems where it remains off.


    Exploitation Requirements and Recommendations

    According to Cisco’s advisory, successful exploitation requires the targeted device to have the vulnerable feature manually enabled. Cisco recommends the following actions:

    • Immediate Upgrade: Apply the latest security patches released on May 8, 2025.
    • Temporary Mitigation: Disable the Out-of-Band AP Image Download feature if upgrades are not immediately possible.

    Cisco notes that disabling the feature does not disrupt AP functionality, as image downloads will fall back to CAPWAP (Control and Provisioning of Wireless Access Points), which is not impacted by this flaw.


    Discovery and Impact

    The flaw was discovered during internal security testing by a member of Cisco’s Advanced Security Initiatives Group (ASIG), identified only as X.B. At this time, there is no evidence that CVE-2025-20188 has been exploited in the wild.

    This vulnerability is categorized under CWE-798: Use of Hard-coded Credentials, a common weakness that can lead to severe breaches when present in production software.


    What SOC Teams Need to Know

    Security operations teams should treat CVE-2025-20188 as a top-priority vulnerability due to its unauthenticated, remote code execution impact and critical CVSS score of 10.0. Although the exploit path relies on the Out-of-Band AP Image Download feature being enabled (which is disabled by default), environments with custom configurations or legacy setups may unknowingly be at risk. SOC teams should immediately audit all Cisco IOS XE wireless controllers for exposure, confirm the feature is disabled if patching is delayed, and begin log analysis for any suspicious HTTPS activity targeting the AP image download interface. It is also recommended to set up alerts for configuration changes that may enable the vulnerable feature and verify integrity of critical system files.

    CVE-2025-20188 presents a serious risk for organizations using Cisco IOS XE-based wireless controllers with the vulnerable image download feature enabled. Administrators are urged to update affected systems immediately or disable the vulnerable feature to prevent potential remote compromise.

    Cisco’s full advisory and mitigation steps are available here:


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • WhatsApp Wins Landmark $167 Million Ruling Against NSO Group for 2019 Spyware Attack

    After more than five years of legal proceedings, a U.S. federal jury has ordered Israeli spyware vendor NSO Group to pay over $167 million in punitive damages—and nearly half a million in compensatory damages—to WhatsApp for its role in a 2019 cyberattack that targeted more than 1,400 users through a vulnerability in the app’s audio calling feature.

    The case stems from a lawsuit filed in October 2019 by WhatsApp, which accused NSO of using its servers to deliver spyware to journalists, dissidents, and human rights defenders across the globe. The malware campaign exploited a now-patched vulnerability to install NSO’s Pegasus spyware, even if the recipient didn’t answer the call.

    On Tuesday, the jury awarded $167,254,000 in punitive damages and $444,719 in compensatory damages—close to what WhatsApp had requested for the costs of incident response, patch development, and user protection.

    “This ruling is an important step forward for privacy and security,” said WhatsApp spokesperson Zade Alsawah. “Today, the jury’s decision to force NSO, a notorious foreign spyware merchant, to pay damages is a critical deterrent to this malicious industry.”

    NSO Group said it is considering its legal options. “We will carefully examine the verdict’s details and pursue appropriate legal remedies, including further proceedings and an appeal,” said spokesperson Gil Lainer.


    Broader Impact on the Spyware Industry

    The decision follows a December 2024 ruling by Judge Phyllis Hamilton, who found NSO Group liable for violating the Computer Fraud and Abuse Act (CFAA), California’s Comprehensive Computer Data Access and Fraud Act, and WhatsApp’s own terms of service. That ruling cleared the way for this week’s jury trial on damages.

    Will Cathcart, head of WhatsApp, has long positioned the case as a pivotal battle for user privacy. In a 2019 op-ed in The Washington Post, he called the lawsuit a “wake-up call” about how commercial surveillance tools are being misused by governments to target civil society.

    “This should serve as a wake-up call for technology companies, governments and all internet users,” Cathcart wrote. “Tools that enable surveillance into our private lives are being abused.”

    John Scott-Railton, a senior researcher at the University of Toronto’s Citizen Lab who has extensively investigated NSO Group, said the ruling sends a strong message.

    “NSO makes many millions helping dictators hack people. After years of delay tactics, it only took the jury a day’s deliberation to see through it,” he told TechCrunch. “Aside from the huge punitive damages, the bigger impact is the blow to NSO’s efforts to hide their business activities.”

    A Precedent-Setting Case

    The verdict marks the first time a spyware vendor has been successfully sued by a U.S. tech company for targeting its users. It’s also a rare instance where a court has awarded significant financial damages in a cyber intrusion case—one that many privacy advocates hope will be a turning point for accountability in the surveillance-for-hire industry.

    Whether NSO Group follows through with an appeal remains to be seen, but the case has already reshaped the conversation around private spyware use and the responsibilities of those who develop and sell these tools.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • The Evolution of Ransomware: From the AIDS Trojan to Triple Extortion

    Ransomware has significantly evolved over the past few decades, transforming from a rudimentary digital extortion tool into a multi-billion-dollar industry. What started with the AIDS Trojan in 1989 has expanded into a sophisticated web of operations that leverage advanced encryption, double-extortion tactics, and cryptocurrency payments. This evolution mirrors both technological advancements and a shift in how cybercriminals operate. Below is a breakdown of key developments in the history of ransomware, highlighting its transformation from a niche threat to a global cybersecurity issue.


    The Early Days: The AIDS Trojan (1989)

    The journey of ransomware began in 1989 with the AIDS Trojan, also known as PC Cyborg, which is regarded as the first recorded instance of ransomware. This malware was distributed through 20,000 infected floppy disks sent to attendees of the World Health Organization’s global AIDS conference in Stockholm.

    How it worked:
    The Trojan encrypted file names on a victim’s computer after 90 reboots and demanded a ransom of $189 to be sent to a P.O. Box in Panama. While this early example was basic and required victims to send payments via mail, it set the stage for ransomware’s future potential.

    Impact:
    Though the AIDS Trojan didn’t cause widespread financial damage, it marked a significant milestone in the history of cybercrime. It was a harbinger of more complex attacks to come.


    Early Evolution: 2004–2007

    GPCoder (2005): A Step Toward Modern Ransomware

    The emergence of GPCoder in 2005 signified a major turning point in ransomware’s capabilities. This malware encrypted important data files and demanded a $200 payment via Western Union or premium text messages. Although not officially classified as ransomware at the time, GPCoder’s tactics foreshadowed many of the strategies used by later strains.

    RSA Encryption and Archievus (2005–2006)

    In 2005, Archievus introduced RSA asymmetric encryption to ransomware attacks. It encrypted files in the “My Documents” folder and required payment for decryption. However, a significant flaw was discovered when all victims were given the same decryption password.

    Locker Ransomware (2007)

    Locker ransomware represented a major shift by locking victims out of their devices entirely, rather than just encrypting files. This new approach utilized aggressive tactics, such as displaying adult content, to pressure victims into paying.


    The Rise of Cryptocurrencies and Ransomware-as-a-Service (RaaS)

    As cybercrime evolved, so did the sophistication of ransomware operations. In 2009, Vundo ransomware emerged, encrypting files and demanding payment for decryption. However, it wasn’t until 2010 with the rise of cryptocurrency that ransomware underwent its next major shift.

    Cryptocurrencies: The Game-Changer

    Bitcoin and other cryptocurrencies allowed ransomware operators to receive payments in a decentralized and untraceable manner. This created a major obstacle for law enforcement, making it harder to track down perpetrators and recover funds.

    Ransomware-as-a-Service (RaaS) (2012)

    In 2012, Reveton became one of the first strains to introduce the Ransomware-as-a-Service (RaaS) model. By masquerading as law enforcement and threatening victims with legal action unless payment was made, Reveton opened the door for less experienced hackers to get involved in ransomware attacks. This lowered the technical barriers for would-be cybercriminals and allowed ransomware to spread more rapidly.


    CryptoLocker: A Turning Point in Ransomware (2013)

    The introduction of CryptoLocker in 2013 marked a watershed moment in the evolution of ransomware. This strain used strong encryption techniques to lock victims’ files and demanded payment in Bitcoin or MoneyPak.

    Impact:
    The operation was highly successful, with the FBI estimating that over $27 million was paid by victims before a coordinated effort dismantled the CryptoLocker botnet. This represented a significant shift, not only in the technical capabilities of ransomware but also in its financial success.


    Modern Ransomware: Double Extortion and Beyond (2019–2025)

    The Emergence of Double Extortion (2019)

    In 2019, the Maze ransomware group introduced a new tactic: double extortion. This method involves two steps: first, the ransomware encrypts the victim’s files; then, the attacker steals sensitive data and threatens to release it unless a ransom is paid. This tactic has been widely adopted by cybercriminals and has made ransomware more threatening than ever.

    Notable Attacks:

    • WannaCry (2017): Exploiting a vulnerability in Microsoft Windows (EternalBlue), WannaCry spread globally, affecting hundreds of thousands of systems across 150 countries. Its impact was massive, disrupting healthcare systems like the UK’s NHS.
    • NotPetya (2017): Unlike traditional ransomware, NotPetya was designed to destroy data irreparably. This attack targeted Ukrainian infrastructure before spreading worldwide, underscoring how ransomware could also be used as a tool of cyber warfare.

    The Business of Ransomware

    By 2020, ransomware became a sophisticated business, with cybercriminal organizations operating with business-like efficiency. Ransomware operations are now often highly organized, with separate teams handling different aspects of the attack: development, execution, and communication with victims.

    Targeting Critical Infrastructure: Ransomware attacks have increasingly focused on critical infrastructure, such as energy grids, water systems, and healthcare institutions. These industries are prime targets due to the potential for significant disruption and the likelihood of paying high ransoms to avoid damage.


    The Future of Ransomware

    As ransomware continues to evolve, it remains one of the most significant threats in the cybersecurity landscape. The continued adoption of cryptocurrencies and RaaS means that ransomware will likely remain a major threat for the foreseeable future.

    Moreover, double extortion tactics have raised the stakes for businesses, making it crucial for organizations to not only back up data but also implement robust cybersecurity measures to protect against these increasingly sophisticated attacks.

    As we move into 2025 and beyond, ransomware is likely to become more targeted and even more destructive, as attackers refine their strategies and exploit vulnerabilities in emerging technologies.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen: Monday Security Brief (5/5/2024)

    Today’s Topics:

    • Microsoft Pushes Passkeys as Default for New Accounts, Paving the Way for a Passwordless Future
    • Disk-Wiping Linux Malware Hidden in Malicious Go Modules Highlights Growing Supply Chain Risk
    • How can Netizen help?

    Microsoft Pushes Passkeys as Default for New Accounts, Paving the Way for a Passwordless Future

    Microsoft is now setting passkeys as the default sign-in method for all newly created consumer accounts, part of a broader industry push to eliminate passwords altogether. According to a joint announcement by Microsoft executives Joy Chik and Vasu Jakkal, the change means that new users will never need to create or manage a traditional password, instead relying on phishing-resistant authentication methods like biometrics and device-based verification.

    The update streamlines the sign-up and login process, automatically selecting the most secure available method for each user. For instance, if both a password and a one-time code are present, the system will default to the code, prompting users to upgrade to a passkey afterward.

    This shift aligns Microsoft with Apple, Google, Amazon, and other major tech firms that are accelerating adoption of passwordless authentication through the use of passkeys. Passkeys are supported by the FIDO (Fast Identity Online) Alliance and leverage public/private key cryptography to verify a user’s identity. When a user registers with a service, their device creates a secure key pair—one private key stored locally, and one public key shared with the service. Authentication requires the user to confirm their identity using biometrics or a device PIN, which then signs a cryptographic challenge with the private key.

    Passkeys remove the need to remember or store passwords, reducing the attack surface for phishing, credential stuffing, and brute-force attacks. As a result, they’re increasingly viewed as a critical defense against account compromise.

    As of late 2024, more than 15 billion user accounts globally support passkey authentication, and Microsoft’s decision to make it the default marks a significant step toward standardizing this method. The company first introduced passkey support in Windows 11 in September 2023, followed by enhancements to Windows Hello. Google similarly began rolling out passkeys as the default login method that same year.

    In addition to improving security for consumer accounts, the FIDO Alliance recently announced a Payments Working Group to explore how passkeys can be applied in payment authentication systems—furthering the goal of widespread passwordless security in both consumer and enterprise environments.

    Existing Microsoft account holders can switch to passkeys by removing their password in their account settings, making full adoption a user-controlled option. With this update, Microsoft makes clear that the future of secure login doesn’t involve passwords at all.


    Disk-Wiping Linux Malware Hidden in Malicious Go Modules Highlights Growing Supply Chain Risk

    Researchers have uncovered three malicious Go modules that deliver a destructive disk-wiping payload to Linux systems, underscoring the severe threat posed by software supply chain attacks. Disguised as legitimate packages, these modules contain heavily obfuscated code that fetches a remote shell script designed to overwrite the system’s primary disk (/dev/sda) with zeroes—permanently disabling the machine.

    The compromised Go modules are:

    • github[.]com/truthfulpharm/prototransform
    • github[.]com/blankloggia/go-mcp
    • github[.]com/steelpoor/tlsproxy

    According to Socket researcher Kush Pandya, once executed, the packages confirm the host OS is Linux and then download the payload using wget. The script executes without warning, rendering the system unbootable and erasing all data beyond recovery.

    “This malicious script leaves targeted Linux servers or developer environments entirely crippled,” Pandya said. “It highlights the extreme danger posed by modern supply-chain attacks that can turn seemingly trusted code into devastating threats.”

    The Go module discovery comes amid a broader trend: researchers from Socket, Sonatype, and Fortinet have also found dozens of malicious packages in the npm and PyPI ecosystems targeting cryptocurrency users and developers.

    Malicious npm packages targeting crypto wallets:

    • crypto-encrypt-ts
    • react-native-scrollpageviewtest
    • bankingbundleserv
    • buttonfactoryserv-paypal
    • tommyboytesting
    • compliancereadserv-paypal
    • oauth2-paypal
    • paymentapiplatformservice-paypal
    • userbridge-paypal
    • userrelationship-paypal

    These packages aim to steal mnemonic seed phrases and private keys used for cryptocurrency wallets, exfiltrating data to attacker-controlled infrastructure.

    Malicious PyPI packages abusing Gmail and WebSockets:

    • cfc-bsb (2,913 downloads)
    • coffin2022 (6,571 downloads)
    • coffin-codes-2022 (18,126 downloads)
    • coffin-codes-net (6,144 downloads)
    • coffin-codes-net2 (6,238 downloads)
    • coffin-codes-pro (9,012 downloads)
    • coffin-grave (6,544 downloads)

    These packages used hard-coded Gmail credentials to quietly send stolen data via SMTP and open remote access channels over WebSockets. This allowed attackers to bypass network detection by leveraging trusted domains such as smtp.gmail.com.

    Olivia Brown, another researcher at Socket, warned that even long-standing packages can be repurposed for malicious use. “Do not trust a package solely because it has existed for more than a few years without being taken down.”

    To defend against these supply chain attacks, security teams and developers should:

    • Audit all open-source dependencies frequently.
    • Verify package authorship, repository links, and update history.
    • Monitor network traffic for unusual outbound connections, including unexpected SMTP or WebSocket activity.
    • Apply strict access controls to protect sensitive environment variables and private keys.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Critical Microsoft Telnet Server Vulnerability Enables Zero-Click NTLM Authentication Bypass

    A newly disclosed zero-click vulnerability in Microsoft’s Telnet Server allows remote attackers to bypass NTLM authentication and gain administrator-level access without credentials. With no official patch available, this flaw presents a serious risk to legacy Windows systems still running Telnet services.


    Vulnerability Overview: Unauthenticated Access via MS-TNAP

    The vulnerability, detailed by cybersecurity researcher Hacker Fantastic, stems from a flaw in Microsoft’s Telnet Authentication Protocol (MS-TNAP). By exploiting a misconfiguration in how Telnet handles NTLM-based authentication, attackers can completely bypass standard credential checks.

    Affected systems include:

    • Windows 2000
    • Windows XP
    • Windows Server 2003
    • Windows Vista
    • Windows Server 2008
    • Windows 7
    • Windows Server 2008 R2

    The vulnerability arises from improper use of Security Support Provider Interface (SSPI) flags during the authentication handshake. The Telnet Server mistakenly configures NTLM to authenticate itself to the client instead of validating the client—effectively inverting the expected trust model.


    How the Exploit Works

    A proof-of-concept (PoC) tool named telnetbypass.exe was released, targeting local and domain-joined hosts. The exploit works as follows:

    1. It initiates a Telnet session requesting NTLM mutual authentication.
    2. A manipulated NTLM handshake is sent with altered SSPI flags (SECPKG_CRED_BOTH, ASC_REQ_DELEGATE, and ASC_REQ_MUTUAL_AUTH).
    3. A forged NTLM Type 3 message tricks the server into treating the attacker as an authenticated user.
    4. Full Telnet access is granted, often under Administrator privileges, with no password required.

    The exploit does not require prior interaction or credentials, making it particularly dangerous in environments still running legacy Microsoft services.


    What Do SOC Teams Need to Know?

    Security Operations Center (SOC) teams should immediately evaluate their environments for any running Telnet Server services, particularly on legacy Windows systems.

    Key actions:

    • Disable Telnet Services: Immediately shut down Telnet Server on all internal systems unless explicitly needed and secured.
    • Apply Network Restrictions: Use firewalls or network access controls to restrict Telnet access to specific trusted IP ranges.
    • Audit Legacy Systems: Perform a full asset inventory to identify and evaluate unsupported or legacy systems that may be vulnerable.
    • Deploy Application Controls: Use group policies or endpoint detection and response (EDR) solutions to prevent execution of unauthorized Telnet clients.
    • Monitor for Exploit Signatures: Look for abnormal NTLM handshake patterns or unusual Telnet traffic, particularly from internal hosts.

    Given the lack of a patch, active monitoring and access control are the only immediate lines of defense.


    Mitigation Recommendations

    Until Microsoft issues a formal patch for this vulnerability, the following steps are strongly advised:

    • Transition to Secure Protocols: Migrate from Telnet to more secure remote access solutions such as SSH.
    • Block Telnet at the Network Perimeter: Prevent Telnet traffic from crossing into sensitive network zones.
    • Implement Detection Rules: Update SIEM systems to monitor for exploitation attempts using known SSPI flag misuse or Telnet-based NTLM anomalies.
    • Educate IT Teams: Ensure administrators are aware of the risk and do not enable Telnet services during troubleshooting or legacy system setup.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans.