Aggregator
BlackHat USA 2024 | vArmor云原生容器沙箱
n.eko – 跑在 Docker 里的多合一浏览器:Firefox、Chrome、Edge、vivaldi、VLC
高端的二进制0day挖掘,往往只需要从1day的分析开始
网安要闻 | 工信部部长:发展卫星互联网,推进第六代移动通信(6G)网络技术研发
研究显示纳米级微塑料颗粒会选择性富集在人类大脑中 但潜在影响尚不明确
Flutter使用JsBridge方式处理Webview与H5通信
Flutter使用JsBridge方式处理Webview与H5通信
janusec: Golang based application security solutions
Janusec Application Gateway Janusec Application Gateway is an application security solution that provides WAF (Web Application Firewall), CC attack defense, a unified web administration portal, private key protection, web routing, and scalable load balancing....
The post janusec: Golang based application security solutions appeared first on Penetration Testing Tools.
CyberChef: web app for encryption, encoding, compression and data analysis
CyberChef The Cyber Swiss Army Knife CyberChef is a simple, intuitive web app for carrying out all manner of “cyber” operations within a web browser. These operations include simple encoding like XOR or Base64,...
The post CyberChef: web app for encryption, encoding, compression and data analysis appeared first on Penetration Testing Tools.
aleph: find the people and companies you look for
Aleph Aleph is a tool for indexing large amounts of both documents (PDF, Word, HTML) and structured (CSV, XLS, SQL) data for easy browsing and search. It is built with investigative reporting as a primary...
The post aleph: find the people and companies you look for appeared first on Penetration Testing Tools.
观点|软件供应链安全分析报告:CrowdStrike “蓝屏”事件
网易:暴雪其他游戏将陆续回归;极越内部信通报「炮轰雷军亏钱卖车」一事;SpaceX将首次发射零重力薯片 | 极客早知道
Live Webinar | Solving the SIEM Problem: A Hard Reset on Legacy Solutions
Post-Quantum Cryptography Is Here: What Are You Waiting For?
Post-Quantum Cryptography Is Here: What Are You Waiting For?
US Authorities Warn Health Sector of Everest Gang Threats
U.S. authorities are warning healthcare sector entities of incidents involving Everest, a Russian-speaking ransomware group and initial access broker, which claims to have stolen sensitive patient information in recent attacks, including on two medical care providers in New York and Nevada.
Global Cyber Agencies Unveil New Logging Standards
The Australian Signals Directorate's Australian Cyber Security Center released joint guidance with a cohort of international cyber agencies that aims to provide baseline standards for event logging and threat detection, amid a wave of high-profile attacks employing "living off the land" techniques.
North Korean Hackers Pivot Away From Public Cloud
A North Korean hacking team hastily pivoted from using publicly available cloud computing storage to its own infrastructure after security researchers unmasked a malware campaign. The group shifted from using cloud service including Google Drive, OneDrive, and Dropbox to systems under its control.
ISMG Editors: Social Engineering, Election Defense in AI Era
AI's influence on social engineering and election security has become a focal point at Black Hat. ISMG editors discuss how advanced technologies are making it easier to manipulate people and compromise security systems and offer key insights on machine learning vulnerabilities.