Author: Farhad

Phoso e kholo ka ho fetesisa ea ts'ireletso lefats'eng la boholo-holo ea boholo-holo: lithuto tsa ts'ireletso ho Valley of the Kings

Ka lebaka la phomolo e telele ea selemo le selemo ea Mastercard (re na le 25 masoabi!) I took a two week trip to Egypt earlier this month to visit a place I have always wanted to see: the burial tombs of the ancient pharaohs in the Valley of the Kings. As a security engineer, I could not help looking at these
Bala haholoanyane

Mesebetsi ea Ts'ireletso ea Marang-rang

Mokhoa oa ho fumana mosebetsi oa maemo a pele oa ts'ireletso ea marang-rang

Poso ena ke karabelo ho motsoalle ea batlang karolo ea ts'ireletso ea marang-rang 'marakeng o thata haholo. Ha e nkuoe e le bothata bo pharalletseng matsatsing ana, I decided to write a post rather than simply leaving a comment. Various statistics from multiple sources suggest that there is a wide gap in cybersecurity roles,…
Bala haholoanyane

Tšusumetso ea WaterHole

Litšusumetso tsa Watering Hole: kamoo APT le bahlaseli ba marang-rang ba kenang litsamaisong tse sirelelitsoeng

Kopano ea ka ea pele le lefatše la bahlaseli ba marang-rang e ile ea etsahala ka morero oa tšusumetso ea watering hole lilemong tse 'maloa tse fetileng. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Bala haholoanyane

credential stuffing

Ho kenya lintlha tsa boitsebiso ha ho DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Bala haholoanyane

application ddos attacks

Litsebo tsa DDoS tsa mefuta ea kopo, le kamoo li ka thibelang kateng

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Bala haholoanyane

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Bala haholoanyane

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
Bala haholoanyane

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Bala haholoanyane