blog

Napad vodenim rupama

Napadi vodenih rupa: APT i cyber kriminalci infiltriraju se u sigurnu infrastrukturu

Moj prvi susret sa svetom sajber kriminalaca dogodio se kroz kampanju napada na vodene rupe pre mnogo godina.. Posetio sam jedan persijski sajt i otkrio da on preuzima malver na posetioce.’ browseri. Odmah sam kontaktirao administratora sajta., koji su me obavestili da nemaju tehničko znanje o ovom problemu.. It became apparent that
Pročitajte više

credential stuffing

Punjenje akreditiva nije DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Pročitajte više

application ddos attacks

DDoS napadi aplikativnog sloja, i kako se mogu eliminisati

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Pročitajte više

Web Application Firewall (WAF)

WAF je mrtav., Long Live Your WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Pročitajte više

Zombi kolačići Verizon Yahoo AOL

Kako se nositi s novim tehnikama praćenja; Zombi kolačići i platno otisci prstiju

Platno otisci prstiju, i Zombie cookie trackers nisu ništa novo; Međutim, ove metode su poboljšane i postale su ozloglašeno učinkovite tokom vremena. Nedavno, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% preciznost. The tracking attempt to collect
Pročitajte više

PHP Suhosin

Kraj Suhosina; što je sljedeće?

Već mnogo godina, Ja revno su koristili Suhosin sa bilo kakve implementacije PHP5 na Apache2 ili PHP-FPM Nginx webservers za odbranu od SQL injekcije i drugih uobičajenih web napada. Zapravo, PHP5 je bio tako katastrofalno, oba u smislu njegove osnovne sigurnosti, i njegove funkcije i module koje nikada nisam mogao začeti koristeći ga…
Pročitajte više

Razbijanje barijera