Blog

WaterHole attack

Watering hole attacks: how APT and cyber criminals infiltrate secure infrastructures

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Read more

credential stuffing

Credential stuffing is no DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Read more

application ddos attacks

Application layer DDoS attacks, and how they can be mitigated

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Read more

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Read more

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
Read more

PHP Suhosin

苏霍辛嘅末日; 下一步係乜嘢?

好多年了, 我熱心地使用Suhosin與Apache2或 PHP-FPM Nginx Web服務器嘅任何 PHP5實現,以抵禦SQL注入同其他常見嘅Web攻擊. 講真., Php5係如此災難性, 在其核心安全性方面, 和它的功能和糢塊,我不可能設想使用它…
Read more