Moonpig API flaw left unfixed for 17 months
Earlier this week, online greetings card company Moonpig took its API offline as a flaw was enabling orders to be placed on customer accounts by hackers. The flaw, identified by researcher Paul Price, allowed hackers to bypass authentication security and…
Read More
January 8, 2015
A Successful SIEM Deployment: Truth or Fantasy?
“A Successful SIEM deployment: truth or fantasy”…a controversial opening statement one might say for a consultant who works for a SIEM provider (LogRhythm) and preaches the virtues of the technology. Am I saying that a successful SIEM deployment is a…
Read More
January 7, 2015
Detecting DNS Tunneling
All kind of different services, like web browsing, email, active directory, etc., use the Domain Name System (DNS) protocol to turn IP addresses into human readable names and vice versa. DNS was never intended to be used for data transfer,…
Read More
December 17, 2014
The SIEM Awakens—Identifying Account Lockouts from BYOD
Windows account lockout policies are an effective and recommended best practise for securing against brute force attacks. When these activities occurs within the perimeter of an Enterprise’s network, LogRhythm’s SIEM makes it a simple task to quickly work out the…
Read More
December 10, 2014
Domain Privilege Escalation Vulnerability
Posted by: Julian Crowley
On Tuesday, Microsoft released an emergency update to Windows Server 2003 through 2012 R2 to address a vulnerability that enables an attacker to escalate privileges for any account on a Windows Domain. The vulnerability can be detected in Windows Server…
Read More
November 19, 2014
What You See is Not What You Copy
Tricking users into copying different commands from what is displayed on a web page… OK, maybe I’m late to this party but I recently came across a very cool attack vector that I had not heard about until now. There’s…
Read More
October 8, 2014