Analyzing impact of leaked client_secret in Authorization Code Flow in Keycloak (CVE-2020-27838)

CVE-2020-27838 describes that Keycloak has an open endpoint where it’s possible to obtain client_secret information, as shown in the example below:
/auth/realms/{realm}/clients-registrations/default/{client_id}

Through other discussions, … Continue reading Analyzing impact of leaked client_secret in Authorization Code Flow in Keycloak (CVE-2020-27838)

If I shouldn’t trust a compromised computer then what’s the point of an antivirus? [closed]

Some security experts say that you shouldn’t trust a computer that has been compromised by an attacker. Now, if an antivirus software detects a malware on a computer, then the malware is already in the computer. Which means that the comput… Continue reading If I shouldn’t trust a compromised computer then what’s the point of an antivirus? [closed]

How do malware analysts guarantee the safety of other devices during dynamic analysis? [closed]

Many security researchers and analysts execute malware in safe environments to analyse how the malware behaves. This sometimes includes allowing the malware to connect to the network because, for example, some malware only begin its execut… Continue reading How do malware analysts guarantee the safety of other devices during dynamic analysis? [closed]