Talla

Karancin tsaro mafi girma a duniyar da ta shude: Darussa na tsaro daga Kogin Masarautu

Godia ga dogon hutu na shekara na Mastercard (muna da 25 kwanaki!) I took a two week trip to Egypt earlier this month to visit a place I have always wanted to see: the burial tombs of the ancient pharaohs in the Valley of the Kings. As a security engineer, I could not help looking at these
Kara karantawa

Ayyukan tsaro na yanar gizo

Yadda ake samun aikin matakin farko na tsaro na yanar gizo

Wannan rubutun martani ne ga aboki wanda ke neman aikin tsaro na yanar gizo a kasuwa mai matukar kalubale. La'akari da cewa wannan matsala ce da ta bazu sosai a yanzu, Na yanke shawarar rubuta wannan rubutu maimakon kawai barin sharhi. Various statistics from multiple sources suggest that there is a wide gap in cybersecurity roles,…
Kara karantawa

WaterHole attack

Watering rami kai hari: Yadda AFT da masu laifi masu launi suna ba da tabbatacciyar hanyar samar da kayayyaki

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Kara karantawa

credential stuffing

Sharar da shaidar ba DDoS bane!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Kara karantawa

application ddos attacks

Aikace-aikacen Ddos kai hari, da kuma yadda za a iya mitigated

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Kara karantawa

Web Application Firewall (WAF)

Waf ya mutu, Dogon Rayuwa!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Kara karantawa

Zombie Cookies Verizon Yahoo AOL

Yadda za a magance sabon dabarun bibiya; Kukis na Zombie da Taso

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% daidaituwa. The tracking attempt to collect
Kara karantawa

PHP Suuhosin

Karshen suhosoin; menene na gaba?

Shekaru da yawa, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. A zahiri, Php5 ya kasance mai matukar bala'i, Dukansu cikin sharuddan tsaron ta, and its functions and modules that I could have never conceived using it
Kara karantawa

Rushe shinge