Blog

Največja varnostna napaka v antičnem svetu: varnostne lekcije iz Doline kraljev

Zahvaljujoč dolgim letnim dopustom Mastercarda (imamo 25 dni!) Prejšnji mesec sem šel na dvotedenski izlet v Egipt, da obiščem kraj, ki sem si ga vedno želel ogledati: pokopališča starodavnih faraonov v Dolini kraljev. Kot varnostni inženir, I could not help looking at these
Preberi več

Delovna mesta na področju kibernetske varnosti

Kako dobiti zaposlitev na začetni ravni kibernetske varnosti

Ta objava je odgovor prijatelju, ki išče delo v kibernetski varnosti na izredno zahtevnem trgu. Glede na to, da gre danes za razširjen problem, I decided to write a post rather than simply leaving a comment. Various statistics from multiple sources suggest that there is a wide gap in cybersecurity roles,…
Preberi več

Napad WaterHole

Napadi Watering hole: kako APT in kibernetski kriminalci vdorijo v varne infrastrukture

Moje prvo srečanje s svetom kibernetskih kriminalcev se je zgodilo preko kampanje napada watering hole pred mnogimi leti. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Preberi več

polnjenje poverilnic

Polnjenje poverilnic ni DDoS!

To sem slišal mnogokrat v zadnjih nekaj letih: nekdo doživlja močan DDoS napad na svojo spletno stran. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Preberi več

application ddos attacks

DDoS napadi na aplikacijski sloj, in kako jih je mogoče ublažiti

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Preberi več

Web Application Firewall (WAF)

WAF je mrtev, naj živi WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Preberi več

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% natančnostjo. The tracking attempt to collect
Preberi več

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Preberi več