Is server side CORS protection enough to mitigate CSRF attacks against stateless APIs?

Assume an Angular SPA application on www.example.com that works invoking an API over that same domain www.example.com/api/…
The Angular app gets a session cookie and sends it in each API call.
The usual CSRF attack would try to execute a… Continue reading Is server side CORS protection enough to mitigate CSRF attacks against stateless APIs?

Are security controls themselves considered assets (e.g., cryptographic keys)

Looking at a plain system (there are no security controls implemented yet), we need to think about its functions and derive appropriate assets which we’d like to protect in order to ensure the system continues to function as intended (also… Continue reading Are security controls themselves considered assets (e.g., cryptographic keys)

What is the difference between "local" and "Adjacent" threat agents?

I am using CVSS to do the vulnerability assessment for my project.
As per documentation here is the definition of local and adjacent

Adjacent (A) The vulnerable component is bound to the network stack, but the attack is limited at the p… Continue reading What is the difference between "local" and "Adjacent" threat agents?

How do I minimize the number of passwords leaked when a PC gets compromized?

For customer support reasons, we need to store passwords to some of our customers’ systems (with their explicit, written permission, of course), as well as, obviously, passwords to some of our own systems. Customer support agents and admin… Continue reading How do I minimize the number of passwords leaked when a PC gets compromized?