<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>Key Threat</title>
	<atom:link href="https://keythreat.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://keythreat.com</link>
	<description>Discussing security, privacy, and web development</description>
	<lastBuildDate>Mon, 24 May 2021 16:51:33 +0100</lastBuildDate>
	<language>en-UK</language>
	<sy:updatePeriod>daily</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>

        <item>
            <title>OWASP Top 10: Cross-Site Scripting (XSS) (A7:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-cross-site-scripting.html</link>
    		<pubDate>Mon, 24 May 2021 16:51:33 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>A cross-site scripting vulnerability (also known as XSS) occurs when a web app allows a user to insert their own code into a webpage that can be seen by other users. The attack happens when a malicious user is able to insert malicious code into the web app. For example: an attacker could add some malicious JavaScript code that would render on other users&#39; browsers. The malicious code could access victims&#39; cookies to carry out a session hijack attack.</p>

<p>Such attacks circumvent the same origin policy of websites, which is designed to stop different websites from sharing data -- keeping them separate. XSS attacks usually allow a malicious user to masquerade as another user and perform actions under that user&#39;s account. This can be particularly dangerous if an attacker is able to masquerade as a user with privileged access, such as admin.</p>

<p>A cross-site scripting attack inserts malicious JavaScript code into a webpage. When a victim visits the infected website, they&#39;re exposed to the malicious code. Once inside the vulnerable application, the attacker can compromise users&#39; interactions with the application. This might involve session hijacking, sensitive data exposure, etc.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Broken Authentication (A2:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-broken-authentication.html</link>
    		<pubDate>Mon, 24 May 2021 16:50:29 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>Broken authentication covers numerous vulnerabilities whereby an attacker impersonates a legitimate user. A broken authentication attack typically exploits a weaknesse in two main areas: session management and credential management.</p>

<p>Session management involves keeping track of a user&#39;s session as they move around a website. Let&#39;s say Alice logs into her bank then navigates to her accounts overview page. She then navigates to the send money page. The bank&#39;s server tracked Alice&#39;s session across those pages, keeping her logged in. But if someone else, say Mallory, hijacked Alice&#39;s session, then Mallory could <em>impersonate</em> Alice.</p>

<p>Credential management involves how users are authenticated to a website. The majority of websites authenticate uses through a username and password. The username identifies the individual user (e.g. Bob) and the password (known only by the user - in theory) verifies the user. But what happens when someone other than Bob -- say, Mallory -- knows Bob&#39;s username and password? Well, Mallory could <em>impersonate</em> Bob.</p>
 [...]]]></description>
		</item>
        <item>
            <title>What is an Intrusion Detection System (IDS)?</title>
    		<link>https://keythreat.com/articles/intrusion-detection-system.html</link>
    		<pubDate>Wed, 16 Sep 2020 15:55:30 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>An intrusion detection system (IDS) monitors network traffic or system information for suspicious activity. Once an IDS discovers a potential intrusion, it typically sends the information to a security information event management system (SIEM) for suitable alerting, logging, etc.</p>

<p>Some IDSs can automatically respond to detected intrusions upon discovery. These are known as intrusion prevention systems (IPS).</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Insufficient Logging and Monitoring (A10: 2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-insufficient-logging-and-monitoring.html</link>
    		<pubDate>Wed, 02 Sep 2020 16:52:22 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>What is an attacker&#39;s primary objective? To break into your website. What is an attacker&#39;s secondary objective? To not get caught. Attackers rely on a lack of monitoring and slow responses to achieve their goals, go undetected, and carry out further attacks.</p>

<p>Many attacks go unnoticed for a long time. Leaving opportunities for attackers to carry out further damage -- or even cover up their tracks. Insufficient logging, monitoring, and incident response plans can all contribute to the amount of damage caused by -- and the time taken to recover from -- an attack.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Using Components with Known Vulnerabilities (A9:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-using-components-with-known-vulnerabilities.html</link>
    		<pubDate>Wed, 26 Aug 2020 16:52:03 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>Web applications often make use of existing libraries and frameworks. This makes development easier since common functionalities can be re-used to save time.</p>

<p>For example: React is a popular front-end JavaScript framework/library that allows developers to create complex front-end applications more easily than using just vanilla JavaScript.</p>

<p>If an attacker can find a vulnerability in such a library then it can have wide-spread and significant implications - since the library may be used by millions of web applications.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Insecure Deserialisation (A8:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-insecure-deserialisation.html</link>
    		<pubDate>Wed, 19 Aug 2020 16:52:03 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>Many web applications serialise and deserialise data -- a process that&#39;s useful for transforming data objects from the application into formats for other purposes, such as transferring over a network.</p>

<p>Think of serialising as a bit like when you move house. You pack all your items into boxes (serialising), transport the boxes via a removal company (transfer over a network), then unpack everything at the other end (deserialising).</p>

<p>An insecure deserialisation attack is like having the removal staff tamper with your contents before they arrive and get unpacked.</p>

<p>A web application might want to transfer one of its data objects (such as a customer object) to another service via API. The application does this by transforming its native data object into a&nbsp;serealisation format suitable for the API. The most common serealisation formats within web applications are JSON and XML.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Security Misconfiguration (A6:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-security-misconfiguration.html</link>
    		<pubDate>Wed, 05 Aug 2020 16:51:33 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>This is one of the most common causes of cyber security breaches. Security misconfiguration may occur due to any number of reasons such as using default settings or displaying excessively verbose -- and therefore not user friendly -- error messages.</p>

<p>It could also be that certain settings are presumed to be secure when they are not. This might happen, for example, when settings become outdated. Such a misconfiguration could allow someone to gain access to the system, leaving the system compromised.</p>

<p>Security misconfigurations are often seen as an easy target by attackers. Misconfigurations can be easy to detect and therefore easy to exploit. So it&#39;s important to understand how to detect them and prevent systems from being compromised.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Broken Access Control (A5:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-broken-access-control.html</link>
    		<pubDate>Wed, 29 Jul 2020 16:51:07 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>The job of an access control system is to limit a user&#39;s (or program&#39;s) access to information or functionality. An access control system would be broken if a user were able to bypass authentication and perform admin tasks.</p>

<p>Imagine you&#39;re at an airport. Passengers are only allowed to access certain parts of the airport. Staff will have varying levels of access to other parts of the airport, depending on their role. Access control is often enforced via locked doors requiring key-card entry. If a passenger could swipe their library card and gain access to secure areas of the airport, then the access control system has failed.</p>

<p>An example of a broken access control system might be where a user can alter the URL of a web app to escalate privileges - such as accessing or changing other users&#39; data - without authentication.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: XML External Entities (XXE) (A4:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-xml-external-entities.html</link>
    		<pubDate>Wed, 22 Jul 2020 16:51:07 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>An XML external entity injection (XXE) involves an attacker interfering with how an application processes an XML file. The attacker might submit XML code to the application that references an external entity, such as a hard drive. If the application is vulnerable to an XXE attack then its XML parser might be tricked into leaking sensitive data to the attacker.</p>

<p>In <a href="https://www.w3.org/TR/REC-xml/" target="_blank">XML terminology</a>, an entity is defined as a storage unit of some type. There are different types of entities, but essentially <a href="https://www.w3.org/TR/REC-xml/#sec-external-ent" target="_blank">external general/parameter parsed entity</a> (often shortened to <em>external entity</em>) can access local or remote content via a declared system identifier (typically a URI).</p>

<p>The real danger of XXE injections is if an attackers escalates the attack to compromise the underlying server or other aspects of the back-end infrastructure. This could happen, for example, if the attacker uses the XXE vulnerability to perform a server-side request forgery (SSRF) attack.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Sensitive Data Exposure (A3:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-sensitive-data-exposure.html</link>
    		<pubDate>Wed, 15 Jul 2020 16:50:29 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>Sensitive data exposure, as the name suggests, is when information (such as usernames, passwords, credit card details, date of birth, etc) stored in an app becomes publicly accessible. Sensitive data exposure is different from a data breach. In a data breach, the leaked information is accessed by an attacker through unauthorised access.</p>

<p>Sensitive data exposure usually occurs as a result of not adequately protecting the systems where information is stored, such as databases. It could be caused by various things such as software flaws, weak encryption, no encryption, or human errors such as uploading data to the wrong system.</p>

<p>Let&#39;s say Alice is doing some online banking. She&#39;s accessing her bank&#39;s website -- which encrypts data with SSL/TLS -- to manage her bank account. Mallory can see Alice&#39;s network traffic (e.g. through an insecure WiFi connection) but it&#39;s encrypted. So Mallory downgrades Alice&#39;s connection from HTTPS to HTTP. Mallory can now see Alice&#39;s network communications with the bank, and get Alice&#39;s session ID. Mallory uses Alice&#39;s session ID to hijack Alice&#39;s session -- allowing Mallory to access Alice&#39;s account and viewing Alice&#39;s sensitive data. In this example, the sensitive data exposed was the session ID which gave Mallory access to more data.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Injection (A1:2017)</title>
    		<link>https://keythreat.com/articles/owasp-top-10-injection.html</link>
    		<pubDate>Wed, 01 Jul 2020 10:00:00 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>Imagine there&#39;s a robot working in a factory. Its job is to move boxes around the factory; picking up boxes from one area and moving them to a packing area. This robot needs a set of instructions to follow so it knows which boxes to pickup and where to put them. Those instructions might be provided by its human manager through a form.</p>

<p>That form might look like this: pickup box from ____ move box to packing area ___, wait for next instruction.</p>

<p>The robot&#39;s manager might input the following data into that form: pickup box from <u>aisle 4</u> move box to packing area <u>4b</u>, wait for next instruction.</p>

<p>That&#39;s all well and good. But what happens if someone enters the following into the form: pickup box from <u>aisle 4</u> move box to packing area <u>4b - then destroy the entire factory whilst singing </u><em>I Wanna Dance With Somebod</em>, wait for next instruction.</p>

<p>Well, we have a problem. No more factory. Oh, and a robot that won&#39;t stop singing <em>I Wanna Dance With Somebody</em>.</p>

<p>This example demonstrates an injection attack. Our machine (in this case, a robot) was given an <em>untrusted</em> input. That input was interpreted as a command, which ultimately altered the execution of the program.</p>
 [...]]]></description>
		</item>
        <item>
            <title>OWASP Top 10: Intro</title>
    		<link>https://keythreat.com/articles/owasp-top-10-intro.html</link>
    		<pubDate>Wed, 24 Jun 2020 17:41:46 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>Founded in 2001 by Mark Curphey, the Open Web Application Security Project (OWASP) is an online community of security researchers and experts that produce standards and best practices.</p>

<p>In 2003, OWASP published its first &quot;Top 10&quot; document, detailing some of the most critical web application security risks facing organisations. Since 2003, OWASP has updated its Top 10 every 3 years and has become a leading industry framework for securing web apps.</p>

<p>One of OWASP&#39;s core principals is that their materials are open-source and accessible to everyone. This means that anyone can learn from the OWASP Top 10 to improve their web application security knowledge and understanding.</p>

<p>In this series of articles we&#39;ll cover each of the OWASP Top 10 security risks along with examples of how these attacks might look.</p>
 [...]]]></description>
		</item>
        <item>
            <title>An Overview of Popular Web Frameworks (and stacks)</title>
    		<link>https://keythreat.com/articles/overview-of-popular-web-frameworks.html</link>
    		<pubDate>Wed, 17 Jun 2020 13:01:32 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>Frameworks help you get projects started more quickly compared to using &quot;vanilla&quot; code. Instead of building completely from scratch, you make use of existing code, libraries, layouts, etc to get your project up-and-running faster.</p>

<p>When it comes to web development, we typically split things into front-end and back-end. Front-end typically consists of languages that implement what you see: HTML, CSS, JavaScript, etc. Back-end typically consists of tech that deals with data processing, using server side languages and databases like Python, Java, PHP, MySQL, PostgreSQL, etc.</p>

<p>In this article we&#39;ll explore popular frameworks including Django, React, Spring. We&#39;ll start with front-end frameworks then cover back-end frameworks.</p>
 [...]]]></description>
		</item>
        <item>
            <title>10 Tips to Increase Zoom Security</title>
    		<link>https://keythreat.com/articles/10-tips-to-increase-zoom-security.html</link>
    		<pubDate>Fri, 12 Jun 2020 16:31:40 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[ [...]]]></description>
		</item>
        <item>
            <title>12 Zoom Alternatives</title>
    		<link>https://keythreat.com/articles/12-zoom-alternatives.html</link>
    		<pubDate>Thu, 11 Jun 2020 16:24:18 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>There are numerous alternative apps to Zoom. Some have a more solid history when it comes to privacy and security. Not all of these apps offer video conferencing (such as Slack and Telegram) but can provide additional / alternative ways for groups to communicate.</p>
 [...]]]></description>
		</item>
        <item>
            <title>How Safe is Zoom?</title>
    		<link>https://keythreat.com/articles/how-safe-is-zoom.html</link>
    		<pubDate>Wed, 10 Jun 2020 13:40:11 +0100</pubDate>
    		<dc:creator>Simon Bell</dc:creator>
    		<description><![CDATA[<p>With many of us working from home since COVID-19, the use of video conferencing has surged. One particular platform, Zoom, has seen a notable rise in popularity. But it&#39;s also received media attention for its privacy and security concerns. So just how safe is Zoom?</p>

<p>Historically, Zoom has had a number of security and privacy issues - which we&#39;ll come to. However, moving forward, the company does appear to be taking things a bit more seriously.</p>

<p>Zoom - originally called Saasbee - was founded in 2011 by Eric Yuan, previously a Cisco Webex engineer and executive. The company initially struggled to gain investment because people thought the video conferencing market was saturated - but managed to raise an initial $3 million in seed money. In 2012 the company changed its name to Zoom Video Communications, Inc. (Zoom) and rolled out its first beta version - which could host up to 15 participants - and had 400,000 users by the end of its first month. Zoom&#39;s first customer was Stanford University.</p>

<p>Zoom became a public company in April 2019 with an initial share of $36 per share. In January 2020 its stock price was $70 per share which rose to $150 in March 2020.</p>
 [...]]]></description>
		</item>    		
</channel>
</rss>