<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Febna V M</title>
    <description>The latest articles on DEV Community by Febna V M (@febnavm).</description>
    <link>https://dev.to/febnavm</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F400386%2Fa022a3ea-05af-4720-a8bc-acd3c30252c1.jpg</url>
      <title>DEV Community: Febna V M</title>
      <link>https://dev.to/febnavm</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/febnavm"/>
    <language>en</language>
    <item>
      <title>Web Cache Deception</title>
      <dc:creator>Febna V M</dc:creator>
      <pubDate>Wed, 09 Feb 2022 21:06:07 +0000</pubDate>
      <link>https://dev.to/febnavm/web-cache-deception-4d56</link>
      <guid>https://dev.to/febnavm/web-cache-deception-4d56</guid>
      <description>&lt;p&gt;Websites often tend to use web caching functionality to improve user experience and enable better performance standards for the users.&lt;/p&gt;

&lt;p&gt;Web caching reduces the load on the web server by caching frequently requested contents. Generally, static and public files are cached such as Style sheets (css), Scripts (js), Text Files (txt), Images (bmp,gif,png etc.),etc.,User specific data or private and sensitive information are not cached. &lt;/p&gt;

&lt;p&gt;However, some misconfigurations may result in deceiving the caching servers to store local copies of sensitive data and serve them to other users. This kind of attack is known as Web Cache Deception. &lt;/p&gt;

&lt;p&gt;The attacker adds a suffix to the path of a page containing sensitive data to make it look like a static, public asset so that the cached copy of the page is stored by the caching server.&lt;/p&gt;

&lt;p&gt;Caches can impact the application architecture in unpredictable ways if a deficient caching architecture is implemented. Web cache deception vulnerabilities might cause the websites to be exposed to other damaging attacks other than data leaks. Operators should ensure that the caching functionalities are properly configured and the application is not affected by them. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://beaglesecurity.com/blog/article/web-cache-deception.html"&gt;&lt;em&gt;Click here to learn more about Web Cache Deception&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Serverless Computing: Security And Challenges
</title>
      <dc:creator>Febna V M</dc:creator>
      <pubDate>Thu, 08 Jul 2021 09:23:48 +0000</pubDate>
      <link>https://dev.to/febnavm/serverless-computing-security-and-challenges-h6c</link>
      <guid>https://dev.to/febnavm/serverless-computing-security-and-challenges-h6c</guid>
      <description>&lt;p&gt;Serverless computing has been on the rise for the past few years. Serverless computing is a new economic model to cloud computing that has proven popular and has emerged to be a boon to many companies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types Of Serverless Infrastructures&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Serverless architectures are cloud-based and service-based. This means that, instead of provisioning and managing their own servers, organizations buy cloud computing services such as the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Software as a Service, or SaaS&lt;/strong&gt;, delivers centrally hosted and managed software on-demand to end-users over the internet (e.g, Slack, Jira, Salesforce, HubSpot, etc).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Infrastructure as a Service, or IaaS&lt;/strong&gt;, delivers resources such as networks, data storage, and computers which must be managed by the end-users and offers essential compute, storage and networking resources on-demand, on a pay-as-you-go basis.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Platform as a Service, or PaaS&lt;/strong&gt;, builds on IaaS by allowing users to deploy and run applications on managed platforms. Deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Function as a Service, or FaaS&lt;/strong&gt;, is a specialized type of PaaS that allows users to develop, manage, and run application functions on managed platforms (e.g, AWS Lambda) without the complexity of building and maintaining the infrastructure.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;How Does A Serverless Environment Reduce The Attack Surface?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The greatest advantage of serverless computing is that enterprises can build back-end applications without being directly involved in maintaining and securing servers. Maintaining and patching up the security loopholes is assigned to the cloud provider.&lt;/p&gt;

&lt;p&gt;Let’s take a look at some of the major responsibilities of the cloud provider:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Patching the infrastructure periodically.&lt;/li&gt;
&lt;li&gt;Securely configuring the infrastructure with the proper security settings to protect itself.&lt;/li&gt;
&lt;li&gt;Setting up the proper account management for the infrastructure.&lt;/li&gt;
&lt;li&gt;Ensure that it only uses currently supported operating systems and software runtimes.&lt;/li&gt;
&lt;li&gt;Responsible for keeping the software runtime up-to-date and configuring it securely.&lt;/li&gt;
&lt;li&gt;Securely configuring the database and network connectivity.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Serverless Security Risks &amp;amp; Challenges&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;However, like any other existing technology, it’s not immune to risks and threats. Some of the security risks faced by serverless computing includes:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Insecure Configuration&lt;/li&gt;
&lt;li&gt;Overprivileged Function Permissions&lt;/li&gt;
&lt;li&gt;Event-Data Injection&lt;/li&gt;
&lt;li&gt;Inadequate Function Monitoring And Logging&lt;/li&gt;
&lt;li&gt;Improper Exception Handling And Verbose Error Messages&lt;/li&gt;
&lt;li&gt;Insecure Third-Party Dependencies&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;Read more on the security and challenges of serverless computing and the best practices for enhancing security in  serverless applications&lt;/em&gt; &lt;a href="https://beaglesecurity.com/blog/article/serverless-computing-security.html"&gt;&lt;em&gt;here&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>serverless</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention </title>
      <dc:creator>Febna V M</dc:creator>
      <pubDate>Wed, 09 Dec 2020 14:11:57 +0000</pubDate>
      <link>https://dev.to/febnavm/man-in-the-middle-mitm-attack-types-techniques-and-prevention-3ee6</link>
      <guid>https://dev.to/febnavm/man-in-the-middle-mitm-attack-types-techniques-and-prevention-3ee6</guid>
      <description>&lt;p&gt;Viruses, malware, ransomware, trojans, phishing and a lot more make a never-ending list of cyber threats. &lt;/p&gt;

&lt;p&gt;One of the most prevalent cyber threats out there that often gets overlooked is manipulator-in-the-middle (previously referred to as ‘man-in-the-middle’) attack. This cyber-attack questions the integrity and confidentiality of communication between two parties.&lt;/p&gt;

&lt;p&gt;Attackers could use the latest MITM attacks and tactics to steal personal or confidential data. &lt;/p&gt;

&lt;p&gt;Some of the techniques used to carry out MITM attacks include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rogue Access Point&lt;/li&gt;
&lt;li&gt;Address Resolution Protocol (ARP) Spoofing&lt;/li&gt;
&lt;li&gt;Domain Name System (DNS) Spoofing&lt;/li&gt;
&lt;li&gt;Email Hijacking&lt;/li&gt;
&lt;li&gt;Internet Control Message Protocol (ICMP) Redirection&lt;/li&gt;
&lt;li&gt;Dynamic Host Configuration Protocol (DHCP) Spoofing&lt;/li&gt;
&lt;li&gt;SSL Stripping&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And it is rarely possible to recognize whether a Man-in-the-Middle attack has occurred or not. But, MITM attacks can be avoided by following some best practices.&lt;/p&gt;

&lt;p&gt;This blog post covers the types and techniques of manipulator-in-the-middle attacks and offers some suggestions to stay safe from MITM attacks.&lt;/p&gt;

&lt;p&gt;Read on to know more. &lt;br&gt;
&lt;a href="https://beaglesecurity.com/blog/article/man-in-the-middle-attack.html"&gt;https://beaglesecurity.com/blog/article/man-in-the-middle-attack.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Secure Configuration of Web Application Firewalls</title>
      <dc:creator>Febna V M</dc:creator>
      <pubDate>Sat, 24 Oct 2020 15:38:12 +0000</pubDate>
      <link>https://dev.to/febnavm/secure-configuration-of-web-application-firewalls-4bll</link>
      <guid>https://dev.to/febnavm/secure-configuration-of-web-application-firewalls-4bll</guid>
      <description>&lt;p&gt;Security threats have always been a prominent issue in this digital era. The more data in digital space, the more precautions we need. &lt;/p&gt;

&lt;p&gt;There’s a possibility of many security threats existing in a typical enterprise distributed application including DDoS, SQL injection, Cross-Site Scripting, etc. When organizations are trying to increase their internal security, hackers are becoming more creative.&lt;/p&gt;

&lt;p&gt;Good security program always requires multiple layers of defence. Multiple layers of security allow one system to catch an attack that may be missed by others. In a hosted application environment those layers typically include firewalls, intrusion detection systems (IDS), and server security.&lt;/p&gt;

&lt;p&gt;A web application firewall or WAF could be the first line of defence among these security layers.&lt;br&gt;
A web application firewall, which is dynamic and heuristic has a promising role in an IT infrastructure.&lt;/p&gt;

&lt;p&gt;It is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.  The WAF can look for unusual traffic activity and automatically block that traffic, even if the traffic does not match a known “bad” pattern which makes it different from intrusion detection systems.&lt;/p&gt;

&lt;p&gt;A WAF operates through a set of rules often called policies. It is also customizable, allowing you to write rules specific to your application.&lt;br&gt;
Some of the WAF policies are listed below:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Web attack signature policy&lt;/li&gt;
&lt;li&gt;URL protection policy&lt;/li&gt;
&lt;li&gt;HTTP protocol constraint policy&lt;/li&gt;
&lt;li&gt;SQL/XSS injection detection policy&lt;/li&gt;
&lt;li&gt;Bot detection&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even though many companies have implemented a WAF, most of the web application firewall configurations are not secure. It would be more effective if the following points are considered while configuring a web application firewall.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Coordinate web application firewall configuration and Web 
Application Update&lt;/li&gt;
&lt;li&gt;Always check for vulnerabilities&lt;/li&gt;
&lt;li&gt;Use a web application firewall with built-in acceleration&lt;/li&gt;
&lt;li&gt;Lockdown the backdoor&lt;/li&gt;
&lt;li&gt;Understanding of web application environment&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A web application firewall acts as the first line of defence and it allows you to make sure that an application is safe by putting in a reasonable amount of initial effort. In addition to implementing them, it is also necessary to properly configure them so that it can be an effective defence mechanism in your bid to keep away hackers.&lt;/p&gt;

&lt;p&gt;A more detailed version on secure configuration of web application firewall published at&lt;br&gt;
&lt;a href="https://beaglesecurity.com/blog/article/secure-web-application-firewall-configuration.html"&gt;https://beaglesecurity.com/blog/article/secure-web-application-firewall-configuration.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Artificial Intelligence In Cyber Security</title>
      <dc:creator>Febna V M</dc:creator>
      <pubDate>Wed, 03 Jun 2020 16:09:38 +0000</pubDate>
      <link>https://dev.to/febnavm/artificial-intelligence-in-cyber-security-5ah7</link>
      <guid>https://dev.to/febnavm/artificial-intelligence-in-cyber-security-5ah7</guid>
      <description>&lt;p&gt;Ever since its inception during the 1950s, artificial intelligence has made tremendous progress in every industry.&lt;/p&gt;

&lt;p&gt;Artificial intelligence made its first step when Alan Turing introduced the Turing test in 1950. Later on, with the development of Eliza, Shakey, Roomba, Siri and Alexa, AI turned from fiction to reality.&lt;/p&gt;

&lt;p&gt;Tons of research and development through the years has also led to artificial intelligence finding its place in cybersecurity. Artificial intelligence and cybersecurity together form a perfect combo for the detection of cyber attacks and harmful trespasses.&lt;/p&gt;

&lt;p&gt;Living in an age of “big data” and the transition to modern web applications has provided enormous resources virtually, that could attract the attention of so-called "bad guys". So it is necessary to secure data in an efficient way. &lt;/p&gt;

&lt;p&gt;Artificial intelligence promises to be a great solution for this.&lt;/p&gt;

&lt;p&gt;AI-driven systems can ensure more accuracy and can cope up with the time consuming manual security testing procedures.&lt;/p&gt;

&lt;p&gt;What we do at Beagle security encompasses the use of this “intelligence” in order to develop a system that can provide better results with reduced false positives and increased accuracy. &lt;/p&gt;

&lt;p&gt;Using AI allows us to actively test through the application response, query strings passed in the URL, error messages and HTTP headers, etc.&lt;/p&gt;

&lt;p&gt;We use a model that combs through data and detects suspicious activity by clustering the data into meaningful patterns using unsupervised machine-learning and on confirmation from the human analysts, builds a supervised model. &lt;/p&gt;

&lt;p&gt;Using this model we are able to develop an efficient security testing system.&lt;/p&gt;

&lt;p&gt;It is true that the potentiality of artificial intelligence can develop sophisticated systems but it must also cope with the complications allied with the emerging technologies.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A more detailed version on how learning models can be used in security testing published at &lt;a href="https://blog.beaglesecurity.com/blogs/2020/05/26/Artificial-Intelligence-in-Cyber-Security.html"&gt;https://blog.beaglesecurity.com/blogs/2020/05/26/Artificial-Intelligence-in-Cyber-Security.html&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>machinelearning</category>
      <category>ai</category>
    </item>
  </channel>
</rss>
