Netsparker’s Weekly Security Roundup 2018 – Week 05

Table of Content

Why You Should Be Careful What You Put Into Your composer.json File
Why You Need to Use a Package Manager

Composer Package Manager Can Expose Sensitive Information
The Principle of Least Privilege Limits Exploitation Opportunities

Continue reading Netsparker’s Weekly Security Roundup 2018 – Week 05

Hackers can execute malicious code through vulnerability in Transmission BitTorrent client

If you download content through the popular Transmission BitTorrent client, take a closer look at its security settings: a critical vulnerability has been detected by Google’s Project Zero reporting team. According to the report published Tuesday… Continue reading Hackers can execute malicious code through vulnerability in Transmission BitTorrent client

Bypassing Corporate Firewalls with Sven Morgenroth, Netsparker – Paul’s Security Weekly #523

Sven Morgenroth of Netsparker joins us to expound upon an original blog post on bypassing corporate firewalls and vulnerable web applications in this technical segment! Full Show Notes Subscribe to YouTube Channel

The post Bypassing Corporate Firewalls with Sven Morgenroth, Netsparker – Paul’s Security Weekly #523 appeared first on Security Weekly.

Continue reading Bypassing Corporate Firewalls with Sven Morgenroth, Netsparker – Paul’s Security Weekly #523

DNS Rebinding attack – does this attack require victim to use an attacker’s DNS server for resolution? How will that happen?

Usually a preferred DNS server will be set in router’s configuration and it will be either the organization’s server or some trusted public server. So how would attacker get the victim to use his DNS server to resolve its dom… Continue reading DNS Rebinding attack – does this attack require victim to use an attacker’s DNS server for resolution? How will that happen?