Triangulation fraud: The costly scam hitting online retailers

In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses resulting from triangulation fraud, estimating monthly losses to range from $660 million to $1 billion among merch… Continue reading Triangulation fraud: The costly scam hitting online retailers

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. The multi-university and industry researc… Continue reading Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Should I be worried about unusual SSH login attempts from unknown IP addresses?

I’ve been monitoring my server’s SSH logs and noticed a steady stream of login attempts from unknown IP addresses, mostly from different countries.
Heaps and heaps of account names are tried, and with some quick server stats I’d say, at le… Continue reading Should I be worried about unusual SSH login attempts from unknown IP addresses?

Fuxnet malware: Growing threat to industrial sensors

In this Help Net Security video, Sonu Shankar, Chief Strategy Officer at Phosphorus, discusses how Blackjack’s Fuxnet malware should be a wakeup call to industrial operators about the vulnerability of sensor networks and the outsized impact these attac… Continue reading Fuxnet malware: Growing threat to industrial sensors

Authorities take down LabHost, phishing-as-a-service platform

Law enforcement from 19 countries severely disrupted one of the world’s largest phishing-as-a-service platform, known as LabHost. This year-long operation, coordinated at the international level by Europol, resulted in the compromise of LabHost’s infra… Continue reading Authorities take down LabHost, phishing-as-a-service platform

Geopolitical tensions escalate OT cyber attacks

In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat Report. He examines how global geopolitical tensions and evolving ransomware … Continue reading Geopolitical tensions escalate OT cyber attacks

Is it possible to trick a user into logging in to a site, then stealing a non HttpOnly cookie that will be set after they log in?

If a user has already logged in, and then the site sets a non HttpOnly cookie, then it seems possible to trick the user into doing something that would lead to the cookie being stolen.
If the cookie expires after one minute, it seems like … Continue reading Is it possible to trick a user into logging in to a site, then stealing a non HttpOnly cookie that will be set after they log in?