Infiltrating the software supply chain is not a new attack method, but the way cybercriminals insinuate themselves and their malicious code into repositories continues to become more sophisticated. Although developers know that any open-source code should be reviewed and vetted, attackers now work to circumvent that practice. In a recent campaign targeting the software supply […]
READ MOREMisconfigurations are the bane of a developer’s existence and a not-so-secret joy for malicious actors. A recently discovered emerging malware campaign focuses on misconfigured servers to gain initial access, then uses traditional Linux attack techniques to deliver a cryptocurrency miner malware and maintain persistence after spawning a reverse shell. The malware attack begins by exploiting […]
A fascinating paper was recently published titled “Stealing Part of a Production Language Model.” In the paper, the authors present the very first attach technique for stealing models that can extract the complete embedding projection layer of proprietary production transformer language models like ChatGPT or PaLM-2. The paper details how an attacker can attack these […]
Introduction In software development, transitioning to a microservices architecture is like breaking a big structure into smaller, more connected units. This change lets you scale and be flexible but also brings security challenges. This article looks at how to secure a microservices architecture. It focuses on strategies to isolate and protect each service. Security Risks […]
Are your Docker containers as secure as they should be? In this article, we delve into Docker and containerization, underscoring the paramount importance of security in this increasingly container-reliant era. By exploring best practices and common challenges, this piece equips you with the essential knowledge to safeguard your Docker environments against looming threats. Understanding Docker […]
At a basic level, understanding session management is straightforward. When a user authenticates to a server, it creates and sends a token to the browser so that the browser can share the authentication information, making future access easier. However, managing session expiration and ensuring that the session token is valid for the requestor becomes challenging. […]
Introduction In software development, third-party libraries are akin to the gears in a well-oiled machine – essential and powerful, yet requiring careful handling. While they bring efficiency and functionality, they also introduce security risks that can compromise your application. This article aims to guide developers through the labyrinth of third-party library security, offering best practices […]
Whether it’s school or car loans, you know that paying off your debt makes your life easier. It can improve your credit score, giving you more financial security. As a developer, you may also suffer from technical debt that impacts your application’s security. In a world where time to delivery is critical, you may make […]
Introduction Within the cascading bytes and bits of digital communications, developers forge pathways of data, threading information through the vast expanse of the internet. However, threats lurking within these pathways seek to intercept, manipulate, and exploit this data. This article ventures into HTTPS and Strict Transport Security (HSTS), offering developers a guide to comprehend, implement, […]
If you’ve ever had a toddler or a cat, you know they usually enjoy that box that an item comes in more than the item itself. In other words, you already know the first rule of business logic testing: the way people use applications isn’t logical. As a developer, you have a set idea about […]
Another year, another Apache Struts 2 vulnerability that can lead to a major data breach. You may remember Apache Struts 2 from previous security alerts, like CVE-2017-5638, CVE-2020-17530, and CVE-2021-31805. When threat actors can find a vulnerability in the open-source web application framework, they immediately seek to create exploits. Typically, developers use the model-view-control (MVC) […]
Introduction In the sprawling expanse of cyberspace, developers diligently weave intricate digital webs, fostering connectivity and enabling the digital experiences that have become integral to our daily lives. Amidst these strands, however, lurk potential threats, one of which stands out due to its silent yet potentially paralyzing impact: the Regular Expression Denial of Service (ReDoS) […]
© 2024 Qwiet. All rights reserved.