gfxgfx
 
Please login or register.

Login with username, password and session length
 
gfx gfx
gfx
76793 Posts in 13502 Topics by 1651 Members - Latest Member: Arnold99 October 13, 2024, 05:36:03 pm
*
gfx*gfx
gfx
WinMX World :: Forum  |  Discussion  |  WinMx World News  |  After an easy breach, hackers leave “TIPS WHEN RUNNING A SECURITY COMPANY”
gfx
gfxgfx
 

Author Topic: After an easy breach, hackers leave “TIPS WHEN RUNNING A SECURITY COMPANY”  (Read 1227 times)

0 Members and 1 Guest are viewing this topic.

A Web security company's systems are offline this morning after an apparent intrusion into the company's network. The servers and routers of Staminus Communications—a Newport Beach, California-based hosting and distributed denial of service (DDoS) protection company—went offline at 8am Eastern Time on Thursday in what a representative described in a Twitter post as "a rare event [that] cascaded across multiple routers in a system wide event, making our backbone unavailable."

The dump, in a hacker "e-zine" format, begins with a note from the attacker. Sarcastically titled "TIPS WHEN RUNNING A SECURITY COMPANY," it details the security holes found during the breach:

  •     Use one root password for all the boxes
        Expose PDU's [power distribution units in server racks] to WAN with telnet auth
        Never patch, upgrade or audit the stack
        Disregard PDO [PHP Data Objects] as inconvenient
        Hedge entire business on security theatre
        Store full credit card info in plaintext
        Write all code with wreckless [sic] abandon

http://arstechnica.com/security/2016/03/after-an-easy-breach-hackers-leave-tips-when-running-a-security-company/

WinMX World :: Forum  |  Discussion  |  WinMx World News  |  After an easy breach, hackers leave “TIPS WHEN RUNNING A SECURITY COMPANY”
 

gfxgfx
gfx
©2005-2024 WinMXWorld.com. All Rights Reserved.
SMF 2.0.19 | SMF © 2021, Simple Machines | Terms and Policies
Page created in 0.014 seconds with 22 queries.
Helios Multi © Bloc
gfx
Powered by MySQL Powered by PHP Valid XHTML 1.0! Valid CSS!