Aggregator
Trickbot Expands Global Targets Beyond Banks and Payment Processors to CRMs
7 years 6 months ago
TrickBot shows no signs of slowing down as new targets are added and command and control servers hide within web hosting providers’ networks.
Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
7 years 6 months ago
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her Instagram page. However,...
The post Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page appeared first on McAfee Blog.
McAfee
Yak Shaving: CISOs Aren’t Immune
7 years 6 months ago
Sometimes, CISOs spin their wheels doing useless security activity that only looks productive from the outside.
BUGKUctf-web-writeup - Zhengjim
7 years 6 months ago
BUGKUctf web writeup 找到了个ctf平台。里面的web挺多的。终于将web题目写的差不多了。 Web 签到题 加群就可以了 Web2 直接 就看到了 文件上传测试 抓包 文件名改成 即可 计算题 改长度限制即可 Web3 阻止一直弹框,然后源代码 解码下就可以了 Sql注入 右键
Zhengjim
KLEE解决迷宫问题
7 years 6 months ago
Terenceli
10 Ways Organizations Can Get Ready for Breach Disclosure
7 years 6 months ago
Facing data breach disclosure requirements across the globe, organizations need to be prepare in advance to respond well.
Ubuntu 16.04安装KLEE
7 years 6 months ago
Terenceli
ServiceStack.Redis 与多线程
7 years 6 months ago
如果是多线程的环境下使用 ServiceStack.Redis,就必须使用连接池,每次从连接池里面获取一个连接供当前线程使用,或者每次都重新实例化一个!
Default Passwords Are Not the Biggest Part of the IoT Botnet Problem
7 years 6 months ago
Providers and manufacturers could go a long way toward reducing the very real threat of IoT.
第三十一期 取证实战篇-Windows日志分析
7 years 6 months ago
Windows事件日志为涉及计算机犯罪案件的破获提供重要证据或线索,因此,在电子数据取证调查过程中扮演越来越重要的作用。
自律方能自由,《网络安全法》实施后的白帽子行为参考
7 years 6 months ago
《网络安全法》已于2017.6.1正式实施,那对于白帽子来说可能都会有一些忐忑和迷茫。一句话建议:自律方能自由。
The CISO: A Field Guide
7 years 6 months ago
Learn to recognize different types of CISOs so you can ensure you’re hiring the right one.
Android Devices Potentially Compromised by Judy App Weaknesses
7 years 6 months ago
We’ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a...
The post Android Devices Potentially Compromised by Judy App Weaknesses appeared first on McAfee Blog.
McAfee
Fight Credential Stuffing by Taking a New Approach to Authorization
7 years 6 months ago
How a token-based authorization model can help organizations dramatically reduce credential stuffing attacks.
Spark编程手抄 - Python
7 years 6 months ago
KINGX
第三十期 取证实战篇-Surface设备取证
7 years 6 months ago
Surface设备的取证难一直困扰大家的问题,本次CCFC峰会上,Surface设备取证的主题分享获得了与会人士的一致关注。
SambaCry: The Linux Sequel to WannaCry
7 years 6 months ago
With simple exploits plaguing Windows and Linux SMB week over week, do yourself a favor and patch for CVE-2017-7494 now to avoid having to do it in panic mode.
Samba远程代码执行漏洞-CVE-2017-7494
7 years 6 months ago
KINGX
安全摘记:关于安全与黑客
7 years 6 months ago
本文曾首发于Sec-UN,现搬运到这个公众号上,略修改。