Aggregator
Fake Account Creation Bots – Part 1
1 year 1 month ago
Part one of a series investigating how automation is used to create fake accounts for fraud, disinformation, scams, and account takeover.
加速人才流动 #11
1 year 1 month ago
近期网络安全相关岗位汇聚
读《做对产品》
1 year 1 month ago
本书给出「如何低成本验证市场需求」的实用指南,有着浓厚的逻辑和统计味道的同时足够简洁。
Ransomware and the cyber crime ecosystem
1 year 1 month ago
A new white paper examines the rise of 'ransomware as a service' and extortion attacks.
【漏洞预警】Apache NiFi MiNiFi C++证书验证不当漏洞威胁通告
1 year 1 month ago
1. 通告信息近日,安识科技A-Team团队监测到Apache NiFi MiNiFi C++中修复了一个证
Active North Korean campaign targeting security researchers
1 year 1 month ago
Threat Analysis Group shares findings on a new campaign by North Korean actors targeting security researchers.
Clement LecigneThreat Analysis Group
Best Practices for Testing Akamai App & API Protector
1 year 1 month ago
Jonathan Carvalho
我在福州很想你......
1 year 1 month ago
东软NetEye携网络安全产品与解决方案参展2023年国家网络安全宣传周网络安全博览会
debian8构建高兼容性pyinstaller打包环境
1 year 1 month ago
半块西瓜皮
DGA Families with Dynamic Seeds: Unexpected Behavior in DNS Traffic
1 year 1 month ago
Connor Faulkner & Stijn Tilborghs
The Era Of ‘Tech Diplomacy’ Is Here
1 year 1 month ago
The post The Era Of ‘Tech Diplomacy’ Is Here appeared first on Global Tech Security Commission.
admin
谛听 工控安全月报 | 8月
1 year 1 month ago
8月│月报 谛听工控安全月报上线了,工信部的最新政策,8月发生的多起工控安全事件,谛听团队收集的最新攻击教据......更多安全资讯,请关注“谛听ditecting",每月更新!
Fast-Tracking Innovation: GreyNoise Labs Experimental CLI
1 year 1 month ago
GreyNoise Labs introduces their new greynoiselabs CLI tool to work with cutting edge, experimental APIs that expose planetary scale internet honeypot and scan data to help defenders stay one step ahead of adversaries.
SnakeYaml反序列化漏洞
1 year 1 month ago
YAML 基本语法YAML,YAML 是"YAML Ain’t a Markup Language"(YAM
3 Ways to Use Zero Trust to Reduce Cybercrime Risk in Healthcare
1 year 1 month ago
Carley Thornell
X-Ways Forensics 21.0预览版发布
1 year 1 month ago
X-Ways Forensics 21.0预览版今天已发布,快来看看更新了哪些内容。
NIST’s Planned Updates to Implementing the HIPAA Security Rule: A Cybersecurity Resource Guide
1 year 1 month ago
Background: NIST Special Publication (SP) 800-66 Healthcare organizations face many challenges from cybersecurity threats. This can have serious impacts on the security of patient data, the quality of patient care, and even the organization’s financial status. Healthcare organizations also must comply with regulatory requirements, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule, which focuses on safeguarding the electronic protected health information (ePHI) held or maintained by HIPAA covered entities and business associates (collectively,
Jeff Marron
原创 | 浅谈Apache Shiro CVE-2023-22602
1 year 1 month ago
从某mail看0day漏洞的防御法则
1 year 1 month ago
知彼知己,百战不殆;不知彼而知己,一胜一负;知己而后守己,胜算七成。