Securityfocus home of bugtraq and other important security mailing lists was defaced today by the attacker known as "Fluffi Bunni". This is probably the best known security site on the net and proof anything can be breached if one spends enough time. According to defaced.alldas.de the advertising company was defaced and fed...
Georgi Guninski has found that the opera browser is vulnerable to multiple Javascript holes. These holes could allow an attacker to gain further privileges. Opera Browser problems
I recently wrote some IDS rule sets I found to be useful for snort that would help detect known, and unknown port80 attacks. I submitted these rules to snort.org and they liked them so much they are now included in the newest release. These rules were based from cgisecurity.com's paper #3 which...
This is the first paper on web application attack forensics published. This paper will give you a basic understanding of what web application attacks look like, and how they are used in real life examples. Fingerprinting Port 80 Attacks (ENG) Russian (Local Copy) (Russian) (Chinese) Japanese translation "The paper provides a nice...