Author: Farhad

Ang pinakamalaking pagkabigo sa seguridad ng sinaunang mundo: Mga aralin sa seguridad mula sa lambak ng mga Hari

Salamat sa Long Taunang Leave ng MasterCard (meron tayo 25 araw!) Tumagal ako ng dalawang linggong paglalakbay sa Egypt mas maaga sa buwang ito upang bisitahin ang isang lugar na lagi kong nais na makita: Ang libing na libingan ng mga sinaunang Paraon sa lambak ng mga hari. Bilang isang security engineer, Hindi ko maiwasang tingnan ang mga ito…
Magbasa pa

Mga trabaho sa cybersecurity

Paano makarating sa isang antas ng entry sa cybersecurity job

Ang post na ito ay isang tugon sa isang kaibigan na naghahanap ng isang papel sa cybersecurity sa isang napaka -mapaghamong merkado. Ibinigay na ito ay isang malawak na isyu sa mga araw na ito, Nagpasya akong magsulat ng isang post sa halip na mag -iwan lamang ng komento. Ang iba't ibang mga istatistika mula sa maraming mga mapagkukunan ay nagmumungkahi na mayroong isang malawak na agwat sa mga tungkulin sa cybersecurity,…
Magbasa pa

WaterHole attack

Pag -atake ng butas ng butas: kung paano ang apt at cyber criminals ay lumusot sa mga ligtas na imprastraktura

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Magbasa pa

credential stuffing

Ang kredensyal na pagpupuno ay walang DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Magbasa pa

application ddos attacks

Pag -atake ng Layer ng Application DDOS, at kung paano sila mapapagaan

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Magbasa pa

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Magbasa pa

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% kawastuhan. The tracking attempt to collect
Magbasa pa

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Magbasa pa