Aggregator
Threat Brief: WordPress Plugin Exploit Leads to Godzilla Web Shell, Discovery & New CVE
1 year 1 month ago
Below is a recent Threat Brief that we shared with our customers. Each year, we produce over 20 detailed Threat Briefs, which follow a format similar to the below. Typically, … Read More
editor
Anatomy of a GreyNoise Tag
1 year 1 month ago
This post explores the utility and methodology behind GreyNoise tags, emphasizing their role in analyzing network data from a non-IP-centric perspective to identify patterns, behaviors, and potential threats.
火线安全加入粤港澳大湾区网络安全协会,共筑网络安全新生态
1 year 1 month ago
2024年3月,火线安全(北京安全共识科技有限公司)正式加入粤港澳大湾区网络安全协会,迈出了推动网络安全行业发
Who Am I? Conditional Prompt Injection Attacks with Microsoft Copilot
1 year 1 month ago
Building reliable prompt injection payloads is challenging at times. It’s this new world with large language model (LLM) applications that can be instructed with natural language and they mostly follow instructions… but not always.
Attackers have the same challenges around prompt engineering as normal users.
Prompt Injection Exploit Development Attacks always get better over time. And as more features are being added to LLM applications, the degrees of freedom for attackers increases as well.
软件工程顶会——ICSE '24 论文清单、摘要
1 year 1 month ago
IOS 16内核内存分配器安全机制分析
1 year 1 month ago
Ios系统的内核内存分配器是目前笔者见到的最为安全的内存分配器,没有之一。
IOS 16内核内存分配器安全机制分析
1 year 1 month ago
Ios系统的内核内存分配器是目前笔者见到的最为安全的内存分配器,没有之一。
IOS 16内核内存分配器安全机制分析
1 year 1 month ago
Ios系统的内核内存分配器是目前笔者见到的最为安全的内存分配器,没有之一。
IOS 16内核内存分配器安全机制分析
1 year 1 month ago
Ios系统的内核内存分配器是目前笔者见到的最为安全的内存分配器,没有之一。
【DFIR报告翻译】SEO投毒到域渗透,Gootloader的传奇依然继续
1 year 1 month ago
你怎么知道我去了家入レオ的LIVE!
网络安全顶会——USENIX Security '24 夏季论文清单、摘要
1 year 1 month ago
Trended Protocols for Security Stuff
1 year 1 month ago
Network Protocols:
IDProtocolSecurity Attack VectorSecurity Issues Score
1TelnetMan-in-the-Middle Attacks70
2SNMPv1Information Disclosure65
3NetBIOSNetwork Reconnaissance60
4SMBv1Remote Code Execution80
5WEPWireless Data Interception75
6A...
Reza Rashidi
Clingendael brengt rapport uit over veiligheid Europees internetverkeer
1 year 1 month ago
Europese landen kunnen meer doen om de controle te houden over de veiligheid van het eigen internetverkeer. Dat concludeert denktank Clingendael in vandaag gepubliceerd onderzoek, waartoe de AIVD opdracht gaf.
The Benefits of Microsegmentation for Compliance
1 year 1 month ago
Ravit Greitser
Address the Challenges of Compliance and Cybersecurity with Zero Trust
1 year 1 month ago
The intersection of compliance and cybersecurity is an opportunity for your organization to adopt solutions that simultaneously solve challenges in both areas.
Ravit Greitser
Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety
1 year 1 month ago
Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an...
The post Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety appeared first on McAfee Blog.
Vishnu Varadaraj
NIST Physicist Sae Woo Nam, Pioneer in Single-Photon Detectors, Passes Away
1 year 1 month ago
During his 25-year career at NIST, Sae Woo performed groundbreaking work. He died in January at 53.
Sarah Henderson
NIST Awards Nearly $3 Million for Educational Programs Focused on Circular Economy to Reduce Plastic Waste
1 year 1 month ago
Six universities will create programs to help develop solutions to problems created by the production and consumption of plastics.
Sarah Henderson
Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
1 year 1 month ago
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year