Author: Farhadas

The ancient world’s biggest security failure: security lessons from the Valley of the Kings

Thanks to Mastercard’s long annual leave (we have 25 days!) I took a two week trip to Egypt earlier this month to visit a place I have always wanted to see: the burial tombs of the ancient pharaohs in the Valley of the Kings. As a security engineer, I could not help looking at these
Skaityti daugiau

Cybersecurity jobs

How to land an entry level cybersecurity job

This post is a response to a friend who is seeking a cybersecurity role in an extremely challenging market. Given that this is a widespread issue these days, I decided to write a post rather than simply leaving a comment. Various statistics from multiple sources suggest that there is a wide gap in cybersecurity roles,…
Skaityti daugiau

"WaterHole" ataka

Laistymo skylės atakos: kaip APT ir kibernetiniai nusikaltėliai įsiskverbia į saugią infrastruktūrą

Mano pirmasis susidūrimas su kibernetinių nusikaltėlių pasauliu įvyko per laistymo angų atakų kampaniją prieš daugelį metų. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Skaityti daugiau

kredencialų įdaras

Kredencialų įdaras nėra DDoS!

Per pastaruosius kelerius metus tai girdėjau daug kartų: kažkas patiria sunkią DDoS ataką savo svetainėje. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Skaityti daugiau

Programos DDoS atakos

Taikymo sluoksnis DDoS atakos, ir kaip juos galima sušvelninti

DDoS (paskirstytas atsisakymas teikti paslaugas) ir DoS (atsisakymas įteikti paslaugas) atakas galima plačiai suskirstyti į tris kategorijas, atsižvelgiant į OSI modelio, į kurį jos nukreiptos, sluoksnius: tinklo sluoksnis (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Skaityti daugiau

Web Application Firewall (WAF)

WAF yra miręs, tegyvuoja WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Skaityti daugiau

Zombie Cookies Verizon Yahoo AOL

Kaip elgtis su naujais sekimo būdais; Zombių slapukai ir drobės pirštų atspaudų ėmimas

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
Skaityti daugiau

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Skaityti daugiau