Blog

WaterHole kurwisa

Kudiridza gomba kurwisa: kuti APT nematsotsi e-cyber vanopinza sei zvivakwa zvakachengeteka

Kusangana kwangu kwekutanga nenyika ye-cyber-matsotsi kwakaitika kuburikidza nekudiridza gomba kurwisa mushandirapamwe makore mazhinji apfuura. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Verenga zvimwe

credential stuffing

Credential stuffing haisi DDoS!

Ndakanzwa izvi kakawanda mukati memakore akati kuti apfuura: mumwe munhu ari kusangana neDDoS inorema kurwiswa pawebhusaiti yavo. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Verenga zvimwe

application ddos ​​kurwisa

Application layer DDoS kurwisa, uye kuti vangadzikiswa sei

DDoS (kuparadzirwa kwekunyimwa basa) uye DoS (kunyimwa basa) kurwiswa kunogona kuiswa muzvikamu zvitatu zvichienderana nezvikamu zveOSI modhi yavanonongedza: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Verenga zvimwe

Web Application Firewall (WAF)

WAF yakafa, rarama kwenguva refu iyo WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Verenga zvimwe

Zombie Cookies Verizon Yahoo AOL

Maitiro ekuita nemaitiro matsva ekutevera; Zombie cookies uye Canvas zvigunwe zvekudhindisa

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
Verenga zvimwe

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Verenga zvimwe