Aggregator
glibc system call wrapper
You're Opted in by Default - Know When and Where to Opt Out
《故事》学习笔记 | Charpter17 人物
Cyber resilience - nothing to sneeze at
Protecting system administration with PAM
How to Detect Pass-the-Hash Attacks Blog Series
Jeff Warren really knows AD security and the Windows Security Log. He brings me a lot of good ideas and tips for enhancing my Security Log Encyclopedia. He also really stays up-to-date on the latest cyber attack techniques and thinks about how to detect them with the Security Log, Sysmon and other logs in the AD/Windows environment. Check out his latest blog post on detecting pass-the-hash with Windows event logs here: https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/
This is the first in a three part series so stay tuned for the rest.
From the Dojo to the SOC
Preparing for denial of service (DoS) attacks
vsyscall and vDSO
Developing the cyber security profession – have your say!
Managing the risk of cloud-enabled products
GDPR security outcomes
February 2019 Security Update Release
February 2019 Security Update Release
Revisiting How Registrants Can Reduce the Threat of Domain Hijacking
Recent events1,2 have shown the threat of domain hijacking is very real; however, it is also largely preventable. As Verisign previously noted3, there are many security controls that registrants can utilize to help strengthen their security posture. Verisign would like to reiterate this advice within the context of the recent domain hijacking reports. Domains are […]
The post Revisiting How Registrants Can Reduce the Threat of Domain Hijacking appeared first on Verisign Blog.