Author: Farhad

An fàilligeadh tèarainteachd as motha san t-seann saoghal: leasanan tèarainteachd bho Ghleann nan Rìgh

Taing do shaor-làithean bliadhnail Mastercard (Tha againn 25 làithean!) Chaidh mi air turas dà sheachdain dhan Èiphit na bu thràithe sa mhìos seo gus tadhal air àite a bha mi a-riamh ag iarraidh fhaicinn: uaighean-adhlaic nan seann Pharaoh ann an Gleann nan Rìgh. Mar innleadair tèarainteachd, Cha b’ urrainn dhomh cuideachadh le bhith a’ coimhead orra sin…
Leugh tuilleadh

Obraichean cybersecurity

Mar a gheibh thu obair cybersecurity ìre inntrigidh

Tha an dreuchd seo mar fhreagairt do charaid a tha a’ sireadh àite cybersecurity ann am margaidh air leth dùbhlanach. Leis gu bheil seo na chùis farsaing na làithean seo, Cho-dhùin mi post a sgrìobhadh seach dìreach beachd fhàgail. Tha diofar staitistig bho ioma-stòran a’ nochdadh gu bheil beàrn mòr ann an dreuchdan cybersecurity,…
Leugh tuilleadh

WaterHole attack

A 'toirt ionnsaigh air tuill uisge: mar a bhios APT agus eucoirich saidhbear a’ toirt a-steach bun-structaran tèarainte

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Leugh tuilleadh

credential stuffing

Chan e DDoS a th’ ann an lìonadh creideas!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Leugh tuilleadh

application ddos attacks

Ìre tagraidh ionnsaighean DDoS, agus mar a ghabhas iad a lasachadh

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Leugh tuilleadh

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Leugh tuilleadh

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% cruinneas. The tracking attempt to collect
Leugh tuilleadh

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Leugh tuilleadh

Breaking Down Barriers