How do I minimize the number of passwords leaked when a PC gets compromized?

For customer support reasons, we need to store passwords to some of our customers’ systems (with their explicit, written permission, of course), as well as, obviously, passwords to some of our own systems. Customer support agents and admin… Continue reading How do I minimize the number of passwords leaked when a PC gets compromized?

What is the Meow Attack and how can I guard my databases against it?

Recently, there has been some news articles about unsolicited attacks on unsecured public facing Elastic and Mongo databases. These are commonly being called "Meow" attacks, resulting in entire databases being deleted without ran… Continue reading What is the Meow Attack and how can I guard my databases against it?

Does HTTPS protect mobile internet connections against "network injection"?

The Star recently published an article describing an alleged attack against a Moroccan journalist. The article describes the attack as such:

Forensic evidence gathered by Amnesty International on Radi’s phone shows that it was infected by… Continue reading Does HTTPS protect mobile internet connections against "network injection"?

How to secure an open port and public IP address when clients must connect to it [duplicate]

I do not have a lot of experience in networking, however, I have built a live-chat application using socket.io and nodeJS. In order to do this, I had to open a port to allow other networks to connect. How can I ensure that the open port do… Continue reading How to secure an open port and public IP address when clients must connect to it [duplicate]

How are websites actually mititating BREACH? (HTTPS + compression)

After reading some popular questions and answer on this website about BREACH, the only advice seems to be: don’t compress anything that might contain secrets (including CSRF tokens). However, that doesn’t sound like great advice. Most webs… Continue reading How are websites actually mititating BREACH? (HTTPS + compression)

Malware Threat Hunting in Airport Systems – KPIs/Metrics to Track [on hold]

I am trying to figure out how to detect potential threats from malwares in various systems installed in the airport.

To be specific, my focus is on the following systems in airports:

Baggage Handling System (BHS)
X-ray mac… Continue reading Malware Threat Hunting in Airport Systems – KPIs/Metrics to Track [on hold]