“Our adversaries our in our networks, exfiltrating our data, and exploiting the Department’s users.” So reads the humbling introduction to zero trust guidance recently released by the Department of Defense...
I would like to straighten the defense of the web application by talking about Intrusion Detection and Prevention Systems (IDS and IPS) as the third member of this security trio...
Intro I want to talk about why you need virtualization/compartmentalization, but through the prism of portable apps. The reason behind this is twofold: I want to outline the potential uses...
Nature abhors a vacuum, and so do cybercriminals. Whenever a new corner of the digital economy emerges, hackers are swift to infiltrate and exploit it to the fullest extent possible....
Introduction: An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local...
Intro We talked about how to access the tor network, what it is, what a tor circuit and torrc file are, and other stuff. For this one, I'd like to...
Many people think that getting key personal information can be very hard, but it's now becoming easier than ever. Last week, I was reading how Elon Musk let go of...
Do you want to view the details of your purchased license? Need to send the license PDF to your CFO? This one is for you. In your dashboard, navigate to...
In my previous article, Code security and safety tips when making guidelines, I mentioned that it is very important to give someone access based on the role assigned in your system....
Introduction: The latest FortiOS / FortiProxy / FortiSwitchManager vulnerability has been reportedly exploited in the wild, which allows an attacker to bypass authentication and login as an administrator on the...