Current Topics and Information

Focused on the ever-changing information security landscape

Sub-header Photo

ACCUVANT BLOG

Decoding IBM WebSphere Portlet URLs

Portlet based web applications built with the IBM Web Experience Factory, previously known as the WebSphere Portlet Factory, produce long URL's containing GZIP'd and base64-encoded data. Viewing and tampering with the data transmitted between the client browser and backing application server is quintessential to application penetration testing. [...] Read more

Read more

Shellshock Burp Scanning

The following is a Java plugin for the web proxy Burp designed to detect CVE-2014-6271, or shellshock, during active scans of web applications. Further versions of the shellshock vulnerability, e.g. CVE-2014-7169, are not detected by this plugin. [...] Read more

Read more

Building a Security-Focused Business Culture

In the recent months, we have seen a disturbing thread in companies hit by major security breaches. In many cases, the problem can be attributed to a number of things; an internal security function that was never properly built, inadequate funding, existing leadership that was not empowered, or existing security leaders deciding to move on to other companies. [...] Read more

Read more

Micro-Segmentation

In my previous blog post, I discussed the importance of segmentation and network design. Moving along in the series brings us to micro-segmentation. This concept goes beyond just segmenting past the traditional network segments, to actually segmenting hosts from each other on the same or different networks. [...] Read more

Read more

How to Reduce Attack Surface

An effective strategy to help protect your organization is to reduce the noise, allowing for easier detection of an exploit; while at the same time increasing the difficulty to compromise. This, in effect, reduces the adversaries operating surface [...] Read more

Read more

Addressing Insider Cybercrime

In a previous blog post, I discussed what triggers insider threat within an organization. Understanding these threats is important so that your organization can take the necessary steps to prevent insider cybercrime. To help minimize the risk, organizations should [...] Read more

Read more

Detecting Shellshock with SIEM Solutions

At the end of September, a serious vulnerability (CVE-2014-6271 and CVE-2014-7169) came to light affecting Linux/Unix and Apple OS X. The seriousness of the Bash Shellshock vulnerability is that it allows unauthenticated, arbitrary code execution remotely. [...] Read more

Read more

Thoughts after a Month With Blackphone

About a month ago, I decided to order a Blackphone. The product web site makes some tall claims about security, even calling it "A secure smartphone." This kind of proclamation is rather bold, perhaps even disingenuous, and often leads to intense scrutiny in the security community. [...] Read more

Read more

What is the Bash Shellshock Bug?

It has been discovered that vulnerability exists within the Bash command-line shell, which has been around for years, is now being actively exploited. What is being dubbed the “Shellshock” bug is a flaw that affects all Linux and UNIX operating systems including Mac OS X. [...] Read more

Read more
(136 Results)