Blog

WaterHole attack

Watering hole attacks: how APT and cyber criminals infiltrate secure infrastructures

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
AfriForum Jeug se 201

credential stuffing

Credential stuffing is no DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
AfriForum Jeug se 201

application ddos attacks

Application layer DDoS attacks, and how they can be mitigated

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
AfriForum Jeug se 201

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
AfriForum Jeug se 201

Zombie Koekies Verizon Yahoo AOL

Hoe om te gaan met nuwe dop tegnieke; Zombie koekies en Canvas vingerafdrukke

Doek vingerafdrukke, en Zombie koekie spoorsnyers is niks nuuts nie; Egter, hierdie metodes verbeter en het berug effektief geword oor die tyd. Onlangs, 'n studie het aan die lig gebring dat een uit elke vier 10,000 die meeste besoekte webwerwe op die internet gebruik doek vingerafdrukke om die besoekers op te spoor met tot 99.9% Akkuraatheid. Die dop poging om in te samel…
AfriForum Jeug se 201

Hierdie artikel is 'n weesbladsy.

Die einde van Suhosin; wat is volgende?

Vir baie jare, Ek het ywerig Suhosin gebruik met enige implementerings van PHP5 op Apache2 of PHP-FPM Nginx webbedieners om te verdedig teen SQL inspuiting en ander algemene web aanvalle. Om die waarheid te sê, PHP5 was so rampspoedig, beide in terme van sy kernsekuriteit, en sy funksies en modules wat ek nooit kon swanger word met behulp van dit…
AfriForum Jeug se 201