Image for post
Image for post

In the space of time it takes you to read this blog post and finish your morning coffee, a company at the vanguard of DevSecOps, such as Etsy, Amazon or Netflix, will have completed yet another deployment — one of potentially thousands per day. Deployment frequency has accelerated to a pace that would have been unthinkable just six years ago, often at the cost of robust security assurance of the code under development. So, the natural question is how companies can effectively scale their security processes to keep pace with the velocity of development we see today? …


Image for post
Image for post
SQL Injection

Primer on SQL Injection (SQLi)

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s relational database server. In order for an SQL Injection attack to take place, the vulnerable website needs to run user input that fails to enforce proper escaping and encoding and runs user inputs as an SQL statement.

SQLi on node-sql

module name: sql version: 0.78.0 npm page: https://www.npmjs.com/package/sql
During research it stumble upon a node-sql module that supports various SQL dialects such as PostgreSQL, mysql, Microsoft SQL Server, Oracle and sqlite dialects but fails to perform necessary escaping, making it vulnerable to potential SQL injection. sql module constructs SQL queries from structured input, and the problem is that it doesn’t do proper escaping of limit/offset parameters, so in setups where those are user-controlled (e.g. …


Image for post
Image for post

The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of any company. Examples of analysis performed within this article are only gather through personal experience. Assumptions made within this article are not reflective of the position of any individual or company other than me of course.

Introduction

Every passing year, software development is disrupting many industries. In this commoditized market, cost-to-company, application security and time-to-market are the only basis of competition. Threat modeling is one of many tools in the arsenal that allows company to leverage consistency and clarity. However the main apprehension surrounding threat modeling is community is not able to agree on the vocabulary. For example, Microsoft security published a threat modeling book and tool and still suffers divergence between the STRIDE/DREAD camp and security testers on what it means to threat model. …


Image for post
Image for post
https://dan.enigmabridge.com/roca-critical-vulnerability-in-infineon-security-chips/

What is it?

ROCA stands for “Return of Coppersmith’s Attack” (ROCA). It is a factorization attack that allows an attacker to exploit the weakness of the software library responsible for generating RSA key pairs in the chips made by German company Infineon Technologies AG. MS Surface extensively uses the chips manufactured from this German company. Along with Surface, the chips manufactured 2012 used in Hardware Secure Modules (HSM), TPM modules (both 1.2 and 2.0), Smart Cards, and Security Tokens are also affected.

The ROCA attack can reverse-calculate private keys used on Webservers, Code Signing certificates, S/MIME and PGP keys, ID Tokens, Smartcard Logon, and Platform Attestation (E.g.: …


What is KRACK?

KRACK (short for, uh, Key Reinstallation AttaCK) targets the third step in a four-way authentication “handshake” performed when your Wi-Fi client device attempts to connect to a protected Wi-Fi network. The encryption key can be resent multiple times during step three, and if attackers collect and replay those retransmissions in particular ways, Wi-Fi security encryption can be broken.

  1. Krack attack targets the router’s authentication protocol, called WPA2. Adversary found an loophole within WPA2 handshake process that connects client to an access point.
  2. Upon successful exploitation of this vulnerability the confidentiality and integrity of the WiFi network may be…


Image for post
Image for post

For more updates follow me on twitter Swapnil Deshmukh

According to an article in Forbes, the cyber crime costs are projected to hit $2 Trillion by 2019 with cyber attack projected losses of at least $9.7 Billion in 2020 by Bloomberg. With recent attacks on Equifax, Kaspersky, SonicWall, Deloitte, and Whole Foods its just matter of time when these projections will turn into a reality. And here is why I think it is a possibility, an outcome of synergistic corporate infrastructure and federation of information is an agile and cohesive corporate environment. …


DISCLAIMER
The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of any company. Examples of analysis performed within this article are only gather through personal experience. Assumptions made within this article are not reflective of the position of any individual or company other than me of course.

For software development lifecycle 2.0 faster integration with security is paramount. In prior life, security organization had created checkpoints at different phases of software development lifecycle to evaluate security’s effectiveness. However with SLA’s for development organizations shrinking as a result of DevSecOps or Shift-Left, integrating security as early as possible is utmost important. …


Newer software development methodologies such as ‘DevOps’ or ‘Shift Left’ is dwindling organizational silos and processes. As a result security organizations is challenged with ensuring effective and efficient security engagement process while integrating Sec (read as Security) in ‘DevSecOps’. And at the forefront of this security engagement is Threat modeling (also known as high-level Architecture Risk Analysis (ARA)). This enables security evangelist to discover potential security vulnerabilities in design phase and eliminate or monitor them during later security engagements. A few security evangelist have taken this one step further to compute the overall business risk based on overall threat model.

In prior software development methodologies like waterfall or agile this was one of the primary functions. Those vulnerabilities were passed as a security requirements and guidelines to development team before even writing a single line of code. However with DevOps automation taking a front seat and manual threat modeling becoming a thing of the past. Security functions are integrated with development or operation units. …

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store