article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

[no description provided] For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012. No, actually, I'm not quite there.

article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012. Seattle has a housing and homelessness crisis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next

Anton on Security

In this post, I wanted to quickly touch on this very topic and refresh some past analysis of this (and perhaps reminisce on how sad things were in 2012 ). Cloud providers haven’t necessarily simplified this journey for customers, even though, compared to 2012 , decent logs actually exist today in many cases.

article thumbnail

PHP addressed critical RCE flaw potentially impacting millions of servers

Security Affairs

This oversight allows unauthenticated attackers to bypass the previous protection of CVE-2012-1823 by specific character sequences. An attacker can exploit the flaw to bypass protections for a previous vulnerability, CVE-2012-1823, using specific character sequences. ” reads the advisory published by DEVCORE.

article thumbnail

Deadglyph, a very sophisticated and unknown backdoor targets the Middle East

Security Affairs

Stealth Falcon is a nation-state actor active since at least 2012, the group targeted political activists and journalists in the Middle East in past campaigns. The attacks have been conducted from 2012 until 2106, against Emirati journalists, activists, and dissidents.

Malware 140
article thumbnail

The Theory and Motive Behind Active/Active Multi-Region Architectures

Security Boulevard

The date was 24th December 2012, Christmas eve. The post The Theory and Motive Behind Active/Active Multi-Region Architectures appeared first on Security Boulevard. The world’s largest video streaming service, Netflix experienced one of its worst incidents in company history.

article thumbnail

It's End of Life for ASafaWeb

Troy Hunt

Windows Server has gone from 2008 R2 to 2012 to 2012 R2 to 2016 to 2019. From development and architecture to security. And lastly,NET has gone through a heap of different versions (as has Visual Studio) from 4.x x to Core 1 and now Core 2 (and minor versions within them). From Sydney to the Gold Coast.