Author: Farhad

O le toilalo sili ona tele o le saogalemu o le lalolagi anamua: Lesona o le saogalemu mai le Vanu o Tupu

Fa'afetai i le umi o aso malolo faaletausaga a Mastercard (O lo'o ia i matou 25 Aso!) I took a two week trip to Egypt earlier this month to visit a place I have always wanted to see: the burial tombs of the ancient pharaohs in the Valley of the Kings. As a security engineer, I could not help looking at these
Faitau atili

Cybersecurity jobs

How to land an entry level cybersecurity job

This post is a response to a friend who is seeking a cybersecurity role in an extremely challenging market. Given that this is a wide issue these days, I decided to write a post rather than simply leaving a comment. Various statistics from multiple sources suggest that there is a wide gap in cybersecurity roles,…
Faitau atili

WaterHole attack

WaterHole attacks: How APT and cyber criminals infiltrate secure infrastructures

My first encounter with world of cyber-criminals happened through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Faitau atili

credential stuffing

O le faʻaogaina o faʻamaumauga sese e le o se DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Faitau atili

application ddos attacks

Faʻalavelave i le vaega apalai o DDoS, ma le auala e mafai ona faʻamamāina ai

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Faitau atili

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Faitau atili

Zombie Cookies Verizon Yahoo AOL

O le auala e taulima ai metotia fou e siaki ai; Zombie kuki ma ata tosi fingerprinting

Ata tosi fingerprinting, ma Zombie kuki trackers e leai se mea fou; ae peitai, o nei metotia ua faaleleia ma ua amata ona aoga notoriously i le aluga o taimi. Talu ai nei, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
Faitau atili

PHP Suhosin

O le iuga o Suhosin; o le ā le mea e sosoo ai?

Mo le tele o tausaga, Sa ou faaaogaina maelega suhosin i soo se implementations o PHP5 i Apache2 po o PHP-FPM Nginx webservers e puipuia ai mai SQL tui ma isi osofaiga masani o Le Uepi. O le mea moni, PHP5 sa matuai matautia lava, i tulaga uma e lua o lona saogalemu autu, ma ona matafaioi ma lona tulaga sa le mafai ona ou faaaogaina…
Faitau atili

Talepeina o Papupuni