Marc Rogers

Your Company Needs YOU: How to Stay Safe from Phishing and Other Human Attacks

Now more than ever, people are targets. For years attackers have been evolving their attacks, looking for new opportunities to find a way in. Attacks against people—so-called social engineering attacks are perhaps the oldest in the world. All you need is a single person to successfully fool another.

The Grugq

CrimeOps: The Operational Art of Cyber Crime

Cyber Crime Innovation Is Lucrative Cybercrime rewards innovative organizations. These can innovate at the tactical level (e.g. new or updated tactics, techniques, and procedures (TTP)), the strategic level (e.g. new monetisation methods), or at the operational level—the management of resources and personnel to achieve strategic objectives. This is operational art. The operational level, the glue that enables a group to execute well, is seldom analyzed because it is rarely visible to...

Vickie Li

How Attackers Bypass MFA

To verify your identity, applications typically ask you to provide something you know, such as a password or a secret key. They may also ask you to prove ownership of something you have, such as a phone or device. Finally, they may ask for proof of who you are by utilizing biometrics. Multi-factor authentication, or MFA, refers to the practice of requiring users to prove their identities in more than one way. MFA protects users in the event of password compromise. When utilized, MFA requires...

Sami Laine

WebAuthn In Enterprise Is Great and It Has Challenges

FIDO2 and WebAuthn hold great promise not only for consumers but for enterprise users as well. There are caveats however, and the challenges for IT departments are very different than for consumer websites.

Vickie Li

Dangerous Regular Expressions

In previous posts, we’ve discussed what regex is along with ReDoS, a regex-specific vulnerability. Now it’s time for us to dig deeper into regex security.

Varrun Ramani

Automating Vulnerable Dependency Checking in CI Using Open Source

Learn how to conduct automatic security scans on your application's dependencies using continuous integration and open-source software.

Brian Demers

Security Audits: Do you need them?

An overview of a recent security audit on an OSS project.

Marc Rogers

Palo Alto Networks SAML Vulnerability

Today, Palo Alto Networks announced a critical security vulnerability affecting SAML certificate management across a range of their devices. While this vulnerability is isolated to Palo Alto Networks Firewalls, it impacts customers using these devices with independent identity providers (IDPs) that rely on the SAML protocol and who are using self-signed certificates, including customers of Okta. Complete details can be found in Palo Alto Networks’ security advisory, here:...

Indranil Jha

Adaptive, Step-Up Multi-Factor Authentication

Plain-old authentication is boring. Today I'm going to show you how you can enhance your application's security by providing smart multi-factor authentication (MFA), the kind that takes contextual and behavior-based factors into account.

Vickie Li

Intro to Log Analysis: Harnessing Command Line Tools to Analyze Linux Logs

Log analysis is one of the most important tools of a security researcher. In this article, we'll take a quick look at how you can analyze Linux logs using common command-line tools.

Page 1 of 4