はてなブックマークアプリ

サクサク読めて、
アプリ限定の機能も多数!

アプリで開く

はてなブックマーク

  • はてなブックマークって?
  • アプリ・拡張の紹介
  • ユーザー登録
  • ログイン
  • Hatena

はてなブックマーク

トップへ戻る

  • 総合
    • 人気
    • 新着
    • IT
    • 最新ガジェット
    • 自然科学
    • 経済・金融
    • おもしろ
    • マンガ
    • ゲーム
    • はてなブログ(総合)
  • 一般
    • 人気
    • 新着
    • 社会ニュース
    • 地域
    • 国際
    • 天気
    • グルメ
    • 映画・音楽
    • スポーツ
    • はてな匿名ダイアリー
    • はてなブログ(一般)
  • 世の中
    • 人気
    • 新着
    • 新型コロナウイルス
    • 働き方
    • 生き方
    • 地域
    • 医療・ヘルス
    • 教育
    • はてな匿名ダイアリー
    • はてなブログ(世の中)
  • 政治と経済
    • 人気
    • 新着
    • 政治
    • 経済・金融
    • 企業
    • 仕事・就職
    • マーケット
    • 国際
    • はてなブログ(政治と経済)
  • 暮らし
    • 人気
    • 新着
    • カルチャー・ライフスタイル
    • ファッション
    • 運動・エクササイズ
    • 結婚・子育て
    • 住まい
    • グルメ
    • 相続
    • はてなブログ(暮らし)
    • 掃除・整理整頓
    • 雑貨
    • 買ってよかったもの
    • 旅行
    • アウトドア
    • 趣味
  • 学び
    • 人気
    • 新着
    • 人文科学
    • 社会科学
    • 自然科学
    • 語学
    • ビジネス・経営学
    • デザイン
    • 法律
    • 本・書評
    • 将棋・囲碁
    • はてなブログ(学び)
  • テクノロジー
    • 人気
    • 新着
    • IT
    • セキュリティ技術
    • はてなブログ(テクノロジー)
    • AI・機械学習
    • プログラミング
    • エンジニア
  • おもしろ
    • 人気
    • 新着
    • まとめ
    • ネタ
    • おもしろ
    • これはすごい
    • かわいい
    • 雑学
    • 癒やし
    • はてなブログ(おもしろ)
  • エンタメ
    • 人気
    • 新着
    • スポーツ
    • 映画
    • 音楽
    • アイドル
    • 芸能
    • お笑い
    • サッカー
    • 話題の動画
    • はてなブログ(エンタメ)
  • アニメとゲーム
    • 人気
    • 新着
    • マンガ
    • Webマンガ
    • ゲーム
    • 任天堂
    • PlayStation
    • アニメ
    • バーチャルYouTuber
    • オタクカルチャー
    • はてなブログ(アニメとゲーム)
    • はてなブログ(ゲーム)
  • おすすめ

    Google I/O

『Qualys Security Blog | Expert network security guidance and news』

  • 人気
  • 新着
  • すべて
  • regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server | Qualys Security Blog

    102 users

    blog.qualys.com

    • テクノロジー
    • 2024/07/01 19:48
    • security
    • openssh
    • SSH
    • あとで読む
    • Vulnerability
    • セキュリティ
    • Linux
    • 未分類
    • CVE-2023-4911: Looney Tunables - Local Privilege Escalation in the glibc’s ld.so | Qualys Security Blog

      3 users

      blog.qualys.com

      • テクノロジー
      • 2023/10/05 08:52
      • Linux
      • セキュリティ
      • security
      • PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034) | Qualys Security Blog

        18 users

        blog.qualys.com

        The Qualys Research Team has discovered a memory corruption vulnerability in polkit’s pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration. About Polkit pkexec for Linux Polkit (former

        • テクノロジー
        • 2022/01/26 13:02
        • vulnerability
        • security
        • linux
        • セキュリティ
        • blog
        • CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit) | Qualys Security Blog

          21 users

          blog.qualys.com

          • テクノロジー
          • 2021/01/27 07:48
          • security
          • linux
          • セキュリティ
          • AV
          • blog
          • あとで読む
          • The Stack Clash | Qualys

            8 users

            blog.qualys.com

            What is the Stack Clash? The Stack Clash is a vulnerability in the memory management of several operating systems. It affects Linux, OpenBSD, NetBSD, FreeBSD and Solaris, on i386 and amd64.  It can be exploited by attackers to corrupt memory and execute arbitrary code. Qualys researchers discovered this vulnerability and developed seven exploits and seven proofs of concept for this weakness, then

            • テクノロジー
            • 2017/06/20 08:55
            • Linux
            • CAA Mandated by CA/Browser Forum | Qualys

              5 users

              blog.qualys.com

              Certification Authority Authorization (CAA), specified in RFC 6844 in 2013, is a proposal to improve the strength of the PKI ecosystem with a new control to restrict which CAs can issue certificates for a particular domain name. Although CAA had been in the proposed-standard state for more than 4 years, there was little obvious happening until very recently, with only a hundred or two hundred site

              • テクノロジー
              • 2017/04/14 12:00
              • DNS
              • *あとで読む
              • Is HTTP Public Key Pinning Dead? | Qualys Security Blog

                13 users

                blog.qualys.com

                I have a confession to make: I fear that HTTP Public Key Pinning (HPKP, RFC 7469)—a standard that was intended to bring public key pinning to the masses—might be dead. As a proponent of a fully encrypted and secure Internet I have every desire for HPKP to succeed, but I worry that it’s too difficult and too dangerous to use, and that it won’t go anywhere unless we fix it. What is public key pinnin

                • テクノロジー
                • 2016/09/06 18:55
                • security
                • あとで読む
                • hpkp
                • The Laws of Vulnerabilities: The GHOST Vulnerability | Qualys Community

                  32 users

                  blog.qualys.com

                  The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue. Qualys security researchers discovered this bug and worked closely with Linux distribution vendors. And as a result of that we are releasing this

                  • テクノロジー
                  • 2015/01/28 09:06
                  • ghost
                  • security
                  • Linux
                  • セキュリティ
                  • IT
                  • あとで読む
                  • Poodle Bites TLS | Qualys Security Blog

                    7 users

                    blog.qualys.com

                    There’s a new SSL/TLS problem being announced today and it’s likely to affect some of the most popular web sites in the world, owing largely to the popularity of F5 load balancers and the fact that these devices are impacted. There are other devices known to be affected, and it’s possible that the same flaw is present in some SSL/TLS stacks. We will learn more in the following days. If you want to

                    • テクノロジー
                    • 2014/12/09 11:21
                    • POODLE
                    • ssl
                    • security
                    • あとで読む
                    • SSL 3 is dead, killed by the POODLE attack | Qualys Security Blog

                      5 users

                      blog.qualys.com

                      The POODLE Attack (CVE-2014-3566) Update (8 Dec 2014): Some TLS implementations are also vulnerable to the POODLE attack. More information in this follow-up blog post. After more than a week of persistent rumours, yesterday (Oct 14) we finally learned about the new SSL 3 vulnerability everyone was afraid of. The so-called POODLE attack is a problem in the CBC encryption scheme as implemented in th

                      • テクノロジー
                      • 2014/10/16 10:43
                      • SHA1 Deprecation: What You Need to Know | Qualys Security Blog

                        4 users

                        blog.qualys.com

                        The news is that SHA1, a very popular hashing function, is on the way out. Strictly speaking, this development is not new. The first signs of weaknesses in SHA1 appeared (almost) ten years ago. In 2012, some calculations showed how breaking SHA1 is becoming feasible for those who can afford it. In November 2013, Microsoft announced that they wouldn’t be accepting SHA1 certificates after 2016. Howe

                        • テクノロジー
                        • 2014/09/18 00:28
                        • SSL Labs: Stricter Security Requirements for 2014 | Qualys Security Blog

                          6 users

                          blog.qualys.com

                          Today, we’re releasing a new version of SSL Rating Guide as well as a new version of SSL Test to go with it. Because the SSL/TLS and PKI ecosystem continues to move at a fast pace, we have to periodically evaluate our rating criteria to keep up. We have made the following changes: Support for TLS 1.2 is now required to get an A. If this protocol version is not supported, the grade is capped at B.

                          • テクノロジー
                          • 2014/01/22 11:03
                          • ssl
                          • security
                          • The Laws of Vulnerabilities: The GHOST Vulnerability | Qualys Community

                            4 users

                            blog.qualys.com

                            Update 3: A Metasploit module has been posted for this vulnerability, it is currently limited to Windows 7 and IE9, but as Wei Chen points out in his post on the Rapid7 community site, all version of IE are infected. Fireeye has also detected three more groups that have started to use CVE-2013-3893 in their attacks and provide more insight in their blog post. Installing the Fix-It that Microsoft h

                            • テクノロジー
                            • 2013/09/18 11:11
                            • Windows
                            • SSL Labs: Deploying Forward Secrecy | Qualys

                              4 users

                              blog.qualys.com

                              Update: This post is obsolete. For guidance on how to deploy TLS securely, please read SSL/TLS Deployment Best Practices, which we always keep up to date. With revelations about mass surveillance in the news everywhere, an obscure feature of SSL/TLS called Forward Secrecy has suddenly become very interesting. So what is it, and why is it so interesting now? Session keys generation and exchange Eve

                              • テクノロジー
                              • 2013/08/07 17:09
                              • Configuring Apache, Nginx, and OpenSSL for Forward Secrecy | Qualys Security Blog

                                13 users

                                blog.qualys.com

                                • テクノロジー
                                • 2013/08/07 03:11
                                • ssl
                                • nginx
                                • apache
                                • security
                                • network
                                • セキュリティ
                                • pfs
                                • RC4 in TLS is Broken: Now What? | Qualys

                                  3 users

                                  blog.qualys.com

                                  RC4 has long been considered problematic, but until very recently there was no known way to exploit the weaknesses. After the BEAST attack was disclosed in 2011, we—grudgingly—started using RC4 in order to avoid the vulnerable CBC suites in TLS 1.0 and earlier. This caused the usage of RC4 to increase, and some say that it now accounts for about 50% of all TLS traffic. Last week, a group of resear

                                  • テクノロジー
                                  • 2013/08/06 15:27
                                  • CRIME: Information Leakage Attack against SSL/TLS | Qualys Security Blog

                                    4 users

                                    blog.qualys.com

                                    It seems that it is that time of year again, when Juliano and Thai present their most recent attack against crypto system. Last year, it was BEAST. This year, it’s CRIME, a practical attack against how TLS is used in browsers. In a wider sense, the same attack conceptually applies to any encrypted protocol where the attacker controls what is being communicated. Initially, it was only known that th

                                    • テクノロジー
                                    • 2013/01/30 14:29
                                    • crime
                                    • Security
                                    • Mitigating the BEAST attack on TLS | Qualys Security Blog

                                      6 users

                                      blog.qualys.com

                                      Update (19 March 2013): This blog post advises to use RC4 to migitate the BEAST attack, but RC4 has recently been discovered to be weaker than previously known. At this point the attacks against RC4 are still not practical. The only fully safe choice at the moment is the AES-GCM suites supported only in TLS 1.2. You can find out more in this new blog post. During the summer rumours about a new att

                                      • テクノロジー
                                      • 2012/08/29 16:58
                                      • ssl
                                      • Security
                                      • Tag: ssllabs | Qualys

                                        24 users

                                        blog.qualys.com

                                        Join the discussion today! Learn more about Qualys and industry best practices. Share what you know and build a reputation. Secure your systems and improve security for everyone.

                                        • テクノロジー
                                        • 2012/08/05 00:18
                                        • TLS
                                        • security
                                        • あとで読む
                                        • *あとで
                                        • Lessons Learned from Cracking 2 Million LinkedIn Passwords | Qualys Security Blog

                                          4 users

                                          blog.qualys.com

                                          Like everyone this week, I learned about a huge file of password hashes that had been leaked by hackers. The 120MB zip file contained 6,458,020 SHA-1 hashes of passwords for end-user accounts. At first, everyone was talking about a quick way to check if their password had been leaked. This simple Linux command line: echo -n MyPassword | shasum | cut -c6-40 allows the user to create a SHA-1 sum of

                                          • テクノロジー
                                          • 2012/06/11 00:02

                                          このページはまだ
                                          ブックマークされていません

                                          このページを最初にブックマークしてみませんか?

                                          『Qualys Security Blog | Expert network security guidance and news』の新着エントリーを見る

                                          キーボードショートカット一覧

                                          j次のブックマーク

                                          k前のブックマーク

                                          lあとで読む

                                          eコメント一覧を開く

                                          oページを開く

                                          はてなブックマーク

                                          • 総合
                                          • 一般
                                          • 世の中
                                          • 政治と経済
                                          • 暮らし
                                          • 学び
                                          • テクノロジー
                                          • エンタメ
                                          • アニメとゲーム
                                          • おもしろ
                                          • アプリ・拡張機能
                                          • 開発ブログ
                                          • ヘルプ
                                          • お問い合わせ
                                          • ガイドライン
                                          • 利用規約
                                          • プライバシーポリシー
                                          • 利用者情報の外部送信について
                                          • ガイドライン
                                          • 利用規約
                                          • プライバシーポリシー
                                          • 利用者情報の外部送信について

                                          公式Twitter

                                          • 公式アカウント
                                          • ホットエントリー

                                          はてなのサービス

                                          • はてなブログ
                                          • はてなブログPro
                                          • 人力検索はてな
                                          • はてなブログ タグ
                                          • はてなニュース
                                          • ソレドコ
                                          • App Storeからダウンロード
                                          • Google Playで手に入れよう
                                          Copyright © 2005-2025 Hatena. All Rights Reserved.
                                          設定を変更しましたx