Aggregator
Regional Threat Perspectives, Fall 2019: Australia
5 years ago
Attackers probed Australian applications for vulnerabilities on the most commonly used ports, and credential stuffing attacks were prevalent.
Is the Cloud Safe? Part 1: Models and Misadventures
5 years ago
Cloud security breaches happen, but how prevalent and dangerous are they? More than you might think.
GCSB encourages leaders to connect with cyber security governance
5 years ago
放贷渣男系列:他到底有多不要脸?
5 years ago
今天天空阴沉沉的,还下了点小雨,我坐在公司天台的秋千上,抽着烟思考着人生。正在这时,手机响了一下,我拿起手机
December 2019 security updates are available
5 years ago
We have released the December security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates.
More information about this month’s security updates can be found in the Security Update Guide.
As a reminder, Windows 7 and Windows Server 2008 R2 will be out of extended support and no longer receiving updates as of January 14, 2020.
December 2019 security updates are available
5 years ago
We have released the December security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates.
More information about this month’s security updates can be found in the Security Update Guide.
As a reminder, Windows 7 and Windows Server 2008 R2 will be out of extended support and no longer receiving updates as of January 14, 2020.
DanaBot’s New Tactics and Targets Arrive in Time for Peak Phishing and Fraud Season
5 years ago
DanaBot makes a strong resurgence at the end of 2019, using new tactics and techniques and expanding beyond its traditional banking targets.
某APP,JNI层自写算法分析
5 years ago
首先我们登陆抓个包,可以发现有一个sign签名认证,在app与服务端接口安全的问题上,sign是一个很好的办
攻防视角下的信息收集
5 years ago
信息收集是指通过各种方式获取所需的信息。信息收集是信息得以利用的第一步,也是关键的一步。---百度百科
Xunruicms
5 years ago
前言 前几天寻思着想挖几个通用的洞 于是在fofa poc列表上找找目标. 锁定目标为php cms 已有0day. 很快就锁定到了这个迅睿cms. 发现可以在
Guardicore Centra Integration now available on CyberArk Marketplace
5 years ago
Privileged Access Management is part of a zero-trust model. Guardicore strengthens its offering by integrating with CyberArk.
Sharon Besser
漏洞挖掘技巧
5 years 1 month ago
仅作为个人的漏洞类型和技巧记录 于阅读漏洞报告时记录 类型 不需要特殊技巧 简单就可以确认的类型 GraphQL查询漏洞 Graphql作为一种前端查询
CISOs Share Their Wisdom, Advice, and Strategies
5 years 1 month ago
Learn from the best CISOs how to handle the challenges of aligning technology and compliance with security architecture.
Managing Traffic From the Outset: How GTM Can Make Your Deployments Easier
5 years 1 month ago
Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions.
Sam Preston
使用github Action自动化部署 Hugo
5 years 1 month ago
前言 最近由于一直在用的travis-ci出现了迷之bug,加上想尝试一下github action就决定尝试用github action替换tr
Regional Threat Perspectives, Fall 2019: Latin America
5 years 1 month ago
Latin American systems received more attacks from IP addresses within the region that coincidentally did not attack anywhere else in the world.
BurpSuite2021.5.1破解版
5 years 1 month ago
0x01 工具介绍BurpSuite是一款信息安全从业人员必备的集成型的渗透测试工具,它采用自动测试和半自动测试的方式,包含了 Proxy,Spider,Scanner,Intruder,Rep...
独自等待
Book: Cybersecurity Attacks - Red Team Strategies
5 years 1 month ago
Excited to announce the book that I have been working on:
Cybersecurity Attacks - Red Team Strategies
Learn about the foundational tactics, techniques and procedures to elevate your red teaming skills and enhance the overall security posture of your organization by leveraging homefield advantage.
Contents and Background Red Team Strategies covers aspects that are not as commonly discussed in literature, including chapters around building and managing a pen test team.
Regional Threat Perspectives, Fall 2019: Canada
5 years 1 month ago
The U.S. and Canada have 95% of top source traffic countries in common.