博客

古代世界最大的安全失敗: 國王谷的安全教訓

多虧萬事達卡的長年假 (我們有 25 天數!) 我本月早些時候去埃及兩週旅行,參觀我一直想看的地方: 古代法老在國王谷的墓穴. 作為一名安全工程師, 我忍不住觀察這些…
閱讀更多

Cybersecurity jobs

如何獲得入門級的網絡安全工作

This post is a response to a friend who is seeking a cybersecurity role in an extremely challenging market. Given that this is a widespread issue these days, I decided to write a post rather than simply leaving a comment. Various statistics from multiple sources suggest that there is a wide gap in cybersecurity roles,…
閱讀更多

WaterHole attack

水坑攻擊: APT 和網絡犯罪分子如何滲入安全基礎設施

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
閱讀更多

credential stuffing

憑證填充攻擊不同於 DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
閱讀更多

application ddos attacks

應用層 DDoS 攻擊, 以及如何緩解它們

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
閱讀更多

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
閱讀更多

殭屍餅乾威瑞森雅虎美國在線

如何處理新的跟蹤技術; 殭屍餅乾和畫布指紋

畫布指紋, 和殭屍餅乾跟蹤器不是什麼新鮮事; 然而, 這些方法得到了改進, 並已成為臭名昭著的有效隨著時間的推移. 最近, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% accuracy. The tracking attempt to collect
閱讀更多

PHP Suhosin。

蘇霍辛的末日; 下一步是什麼?

很多年了, 我熱心地使用 Suhosin 與 Apache2 或 PHP-FPM Nginx Web 伺服器的任何 PHP5 實現, 以抵禦 SQL 注入和其他常見的 Web 攻擊. 事實上, PHP5 是如此災難性, 無論是在其核心安全性方面, and its functions and modules that I could have never conceived using it
閱讀更多

打破障礙