Bilaogy

Ny fahadisoana lehibe indrindra tamin'ny fiarovana tamin'ny tontolo taloha: lesona momba ny fiarovana avy amin'ny Lohataona Mpanjaka

Misaotra ny fialan-tsasatra lava isan-taonan'i Mastercard (manana 25 andro!) Nanao dia roa herinandro tany Ejipta aho tamin'ny fiandohan'ity volana ity mba hitsidika toerana iray izay tiako ho hita hatrizay: ny fasana fandevenana ireo farao fahiny ao amin'ny Lohasahan'ny Mpanjaka. Amin'ny maha-injeniera fiarovana ahy, Tsy afaka ny tsy hijery azy ireo aho…
Hamaky bebe kokoa

Asa amin'ny cybersecurité

Ahoana ny fomba hahazoana asa amin'ny cybersecurité amin'ny ambaratonga voalohany

Ity lahatsoratra ity dia valin'ny namana iray izay mitady andraikitra amin'ny cybersecurité amin'ny tsena tena sarotra. Raha jerena fa olana be ity ankehitriny, Nanapa-kevitra ny hanoratra lahatsoratra aho fa tsy hiala fotsiny fanehoan-kevitra. Tombana isan-karazany avy amin'ny loharano maro no mampiseho fa misy elanelana malalaka amin'ny andraikitra amin'ny fiarovana an-tserasera,…
Hamaky bebe kokoa

Fanafihana WaterHole

Fanafihana Watering hole: ny fomba fidiran'ny APT sy jiolahy amin'ny rafitra voaaro

Ny fihaonako voalohany tamin'ny tontolon'ny jiolahy amin'ny aterineto dia tamin'ny alalan'ny fanentanana fanafihana watering hole taona maro lasa izay. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Hamaky bebe kokoa

credential stuffing

Ny famenoana kaonty dia tsy DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Hamaky bebe kokoa

application ddos attacks

Fanafihana DDoS amin'ny soson'ny fampiharana, ary ny fomba azo atao hisorohana izany

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Hamaky bebe kokoa

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Hamaky bebe kokoa

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
Hamaky bebe kokoa

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Hamaky bebe kokoa

Breaking Down Barriers