Paul Molin

1.1K posts

Paul Molin banner
Paul Molin

Paul Molin

@paulmolin42

Web Application Security Evangelist at Theodo Subscribe here ➡ https://t.co/Q0GhpdQ53E

Katılım Mart 2015
275 Takip Edilen387 Takipçiler
Paul Molin
Paul Molin@paulmolin42·
@maxthoon Impressive, and not totally unexpected 😅
English
0
0
0
17
Maxime Thoonsen
Maxime Thoonsen@maxthoon·
Very clever hack and not the last one with ai agents. Poke @paulmolin42
Abi Raghuram@AbiCodeIntegrit

We got @NotionHQ to leak your private Notion pages 💀 On Thursday @NotionHQ announced Notion 3.0 with support for custom agents using MCP (built by @AnthropicAI) — powerful, but dangerous. @simonw calls these MCP related attacks the “lethal trifecta”: the combination of LLMs, tool access, and persistent memory. Notion’s web-search tool accepts freeform queries as input. With a simple indirect prompt injection we tricked the web search tool into exfiltrating private Notion pages to an attacker controlled server. Now that Notion supports MCPs, prompt injections can come from many sources (GitHub, Jira, email, etc.). Adding AI agents to Notion poses a major security risk all it takes is one prompt injection for private data to leak. Read the writeup: codeintegrity.ai/blog/notion #makewithnotion

English
1
0
1
257
Paul Molin retweetledi
OWASP® Foundation
OWASP® Foundation@owasp·
The OWASP Smart Contract Top 10 (2025) is here! Stay ahead of emerging threats in smart contract security! Whether you're a Web3 developer, auditor, or blockchain enthusiast, this updated list is your go-to resource for securing smart contracts! Read the full list here: owasp.org/www-project-sm…
OWASP® Foundation tweet media
English
4
80
233
18.7K
Paul Molin retweetledi
Marine du Mesnil
Marine du Mesnil@marine_mesnil·
Pour la sortie de notre livre "Il était une faille", coécrit avec @paulmolin42, nous organisons une table ronde sur "Comment créer une culture de sécurité dans ses équipes de développement". 🗓️ 4 février - 19h 📍Theodo: 48 bd des Batignolles Inscription : addevent.com/event/SJ246179…
Marine du Mesnil tweet media
Français
1
4
4
196
Paul Molin retweetledi
Dave Kennedy
Dave Kennedy@HackingDave·
Smart phish via github - email comes from github - issue is created on repo that suspicious activity was detected and to click link to revoke access. When you click the link its to give full permissions to that repo. If you didn't know it was an issue, might accidentally give access to repo.
Dave Kennedy tweet mediaDave Kennedy tweet media
English
9
113
382
58.1K
Paul Molin retweetledi
Olivier Poncet 🦝
Olivier Poncet 🦝@ponceto91·
On enchaine avec « il était une faille, 5 histoires sur l'AppSec et ce qu'on peut en apprendre » par @paulmolin42 #Volcamp
Olivier Poncet 🦝 tweet media
Français
1
1
3
486
Paul Molin retweetledi
Marine du Mesnil
Marine du Mesnil@marine_mesnil·
@maxthoon @paulmolin42 The only thing to remember: a good password is long and not compromised! We will talk about it in our next conference about Authentication with @paulmolin42 🎉
English
0
1
2
61
Maxime Thoonsen
Maxime Thoonsen@maxthoon·
At least! You should not ask your user to change their passwords! Cc @paulmolin42 @marine_mesnil
BlackRoomSec@blackroomsec

Please share this far and wide. As far and wide as you can. NIST Password Guidelines for 2024 are in the process of being updated. This is a HUGE pet-peeve of mine (when vendors in particular are still operating like its 2017 and keep changing passwords every 60 days, STOP DOING THIS, it's outdated and has been shown to put you MORE at risk than less -- NIST explains why it does in this document, meticulously outlining user behavior**) so I'm sharing this in the hopes all of you will pass it along to your bosses. The Special Publication series governing passwords is SP 800-63 "Digital Identity Guidelines". The 2024 version is 800-63-4. Here: pages.nist.gov/800-63-4/ The companion docs are also on that link. They are 800-63A, 800-63B and 800-63C. These are different documents for different scenarios in play at your org. The previous update was in2020. The changes in the 2020 version from the 2017 version were numerous but one of them was that the password verification method should NO LONGER require passwords be changed at specific intervals (i.e. every 60 days) but in the following circumstances instead: 1. After a breach/compromise 2. User request 2024 repeats this and adds a bunch more guidlines but here is a screenshot of page 13 of the new 800-63-4 (note the # 4 after it) which outlines how your systems should now and moving forward, be handling passwords. This goes for Active Directory, too. All your systems which have passwords should align with these guidelines provided there isn't another standard or framework you must adhere to which overrules this. Most frameworks, however, have moved away from arbitrary password resets and complexity rules. **We cybersec researchers and hackers use wordlists from breaches in a variety of different ways. Hackers use them in tooling to crack passwords whereas researchers use breach dumps to see the kinds of passwords users are creating and the psychology behind them. Using complexity rules gets you the user psychology of: Password1 Password2 and so on Use phrasing instead and allow for spaces, which is important. Humans type phrases with spaces. They also mention phish-resistant methods and most vendors are on-board with MS going to be turning off all Legacy Auth next month, across all free accounts and tenancies. I'm so excited for the new changes! Ok I'm off my soapbox. Share the love! Thank you!

English
2
0
1
235
Liran Tal
Liran Tal@liran_tal·
🧠 trivia: Can you name security advantages of using raw string SQL queries as opposed to SQL ORMs?
English
11
0
7
1.9K
Paul Molin
Paul Molin@paulmolin42·
@liran_tal Is this more or less related to mass assignment? When you're using an ORM you're less likely to specify exactly which fields in the entity you want to update?
English
0
0
1
25
Marine du Mesnil
Marine du Mesnil@marine_mesnil·
@malvaultw @ledevnovice Ou faire des tests d'intrusion avec les développeurs pour leur montrer le côté attaquant et comment on voit la surface d'attaque. Ce qui marche le mieux c'est toujours de raconter des histoires ! C'est notamment ce que fait @paulmolin42 dans ses conférences.
Français
1
0
0
47
Le Dev Novice
Le Dev Novice@ledevnovice·
J'ai des ami(e)s codeurs qui connaissent bien les sujets cyber sécurité et qui serait prêt à venir dispenser une formation en entreprise ? 👀
Français
5
2
4
1.9K
Paul Molin retweetledi
Jeff Barr ☁️
Jeff Barr ☁️@jeffbarr·
Update: S3 engineers are working to make unauthorized requests that customers did not initiate free of charge. This change will cover a range of HTTP 3xx/4xx status codes, including all of those cited in the article. We're moving quickly and we plan to share more details this week.
Jeff Barr ☁️@jeffbarr

Thank you to everyone who brought this article to our attention. We agree that customers should not have to pay for unauthorized requests that they did not initiate. We’ll have more to share on exactly how we’ll help prevent these charges shortly. #AWS #S3 How an empty S3 bucket can make your AWS bill explode - @maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1" target="_blank" rel="nofollow noopener">medium.com/@maciej.pocwie…

English
46
466
2.7K
636.8K
Paul Molin retweetledi
Benoît Charles-Lavauzelle
🚀 Exciting news! The "Lean Tech Manifesto" is officially launched, building on the Agile Manifesto's foundations but scaled for large organizations. After 15 years of studying global tech giants and applying lessons to our growth 📖 amazon.fr/Lean-Tech-Mani…
Benoît Charles-Lavauzelle tweet media
English
0
7
22
810
Paul Molin retweetledi
AJ Stuyvenberg
AJ Stuyvenberg@astuyve·
AWS needs to stop charging for 4xx requests to s3 buckets immediately. In GitHub here are 63k references to us-east-1 buckets alone. Anyone can start racking up massive bills for these users with a simple PUT request! This is insane: @maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1" target="_blank" rel="nofollow noopener">medium.com/@maciej.pocwie…
AJ Stuyvenberg tweet media
English
57
224
2K
515.6K