Subgraph OS — Secure Linux Operating System for Non-Technical Users

Information security and privacy are consistently hot topics after Edward Snowden revelations of NSA’s global surveillance that brought the world’s attention towards data protection and encryption as never before.

Moreover, just days after Windows 1… Continue reading Subgraph OS — Secure Linux Operating System for Non-Technical Users

XSS without HTML: Client-Side Template Injection with AngularJS

Abstract
Naive use of the extremely popular JavaScript framework AngularJS is exposing numerous websites to Angular Template Injection. This relatively low profile sibling of server-side template injection can be combined with an Angular sandbox escap… Continue reading XSS without HTML: Client-Side Template Injection with AngularJS

XSS without HTML: Client-Side Template Injection with AngularJS

Abstract
Naive use of the extremely popular JavaScript framework AngularJS is exposing numerous websites to Angular Template Injection. This relatively low profile sibling of server-side template injection can be combined with an Angular sandbox escap… Continue reading XSS without HTML: Client-Side Template Injection with AngularJS

Reading physical memory frame previously owned by another process to read contents of its memory page

I had a conversation with @anger32 who states that zeroing a physical memory page frame when passing the page backed by that frame to another process is not the responsibility of OSes like Windows and Linux (though they do th… Continue reading Reading physical memory frame previously owned by another process to read contents of its memory page

What are the potential security problems running untrusted code in a Docker container as a non-root user?

I’ve seen plenty of ink spilled by now about how Docker is not sufficiently isolated to allow arbitrary containers to be run in a multi-tenant environment, and that makes sense. “If it’s root in Docker, consider it root in the host machine… Continue reading What are the potential security problems running untrusted code in a Docker container as a non-root user?