Blog

Lub ntiaj teb txheej thaum ub kev ruaj ntseg loj tshaj plaws: Cov lus qhia kev ruaj ntseg los ntawm Valley of the Kings

Ua tsaug rau Mastercard lub sijhawm so ntev txhua xyoo (peb muaj 25 hnub!) I took a two week trip to Egypt earlier this month to visit a place I have always wanted to see: the burial tombs of the ancient pharaohs in the Valley of the Kings. As a security engineer, I could not help looking at these
Nyeem ntxiv

Cybersecurity cov hauj lwm

Yuav ua li cas kom tau txais txoj haujlwm nkag mus rau qib cybersecurity

Cov ncej no yog sau rau ib tus phooj ywg tab tom nrhiav txoj haujlwm cybersecurity hauv kev ua lag luam nyuaj heev. Txij li qhov teeb meem no muaj ntau yam niaj hnub no, I decided to write a post rather than simply leaving a comment. Various statistics from multiple sources suggest that there is a wide gap in cybersecurity roles,…
Nyeem ntxiv

WaterHole tawm tsam

Kev tawm tsam lub qhov dej: yuav ua li cas cov kev hem thawj tsis tu ncua thiab cybercriminals nkag mus rau cov kab ke ruaj ntseg

Kuv thawj qhov kev paub nrog cybercriminal kev ua haujlwm yog los ntawm kev tawm tsam lub qhov dej ntau xyoo dhau los. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Nyeem ntxiv

credential stuffing

Cov ntawv pov thawj stuffing tsis yog DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Nyeem ntxiv

application ddos attacks

Daim ntawv thov txheej DDoS tawm tsam, thiab txoj hauv kev los tiv thaiv lawv

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Nyeem ntxiv

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Nyeem ntxiv

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
Nyeem ntxiv

PHP Suhosin

Kawg ntawm Suhosin; Dab tsi ntxiv?

Tau ntau xyoo, Kuv kub siab lug tau siv Suhosin nrog tej kev siv phP5 rau Apache2 los yog PHP-FPM Nginx webservers cug tiv thaiv SQL txhaj thiab lwm hom web tuaj. Qhov tseeb, PHP5 yog li disastrous, Ob leeg ntawd nws cov tub ntxhais ruaj ntseg, and its functions and modules that I could have never conceived using it
Nyeem ntxiv