article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

[no description provided] For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012. No, actually, I'm not quite there.

article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012. Seattle has a housing and homelessness crisis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next

Anton on Security

In this post, I wanted to quickly touch on this very topic and refresh some past analysis of this (and perhaps reminisce on how sad things were in 2012 ). Cloud providers haven’t necessarily simplified this journey for customers, even though, compared to 2012 , decent logs actually exist today in many cases.

article thumbnail

PHP addressed critical RCE flaw potentially impacting millions of servers

Security Affairs

This oversight allows unauthenticated attackers to bypass the previous protection of CVE-2012-1823 by specific character sequences. An attacker can exploit the flaw to bypass protections for a previous vulnerability, CVE-2012-1823, using specific character sequences. ” reads the advisory published by DEVCORE.

article thumbnail

The Theory and Motive Behind Active/Active Multi-Region Architectures

Security Boulevard

The date was 24th December 2012, Christmas eve. The post The Theory and Motive Behind Active/Active Multi-Region Architectures appeared first on Security Boulevard. The world’s largest video streaming service, Netflix experienced one of its worst incidents in company history.

article thumbnail

It's End of Life for ASafaWeb

Troy Hunt

Windows Server has gone from 2008 R2 to 2012 to 2012 R2 to 2016 to 2019. From development and architecture to security. And lastly,NET has gone through a heap of different versions (as has Visual Studio) from 4.x x to Core 1 and now Core 2 (and minor versions within them). From Sydney to the Gold Coast.

article thumbnail

Threat actor claims to have stolen 1 TB of data belonging to Saudi Aramco

Security Affairs

This isn’t the first attack suffered by the Oil giant, in 2012 Saudi Aramco suffered a major cyber attack, alleged nation-state actors used the Shamoon wiper to destroy over 30,000 computers of the company. ZeroX is also offering a 1 GB sample for US$2,000 that could be paid in Monero (XMR) virtual currency.