Aggregator
Trended Protocols for Security Stuff
2 years 1 month ago
Network Protocols:
IDProtocolSecurity Attack VectorSecurity Issues Score
1TelnetMan-in-the-Middle Attacks70
2SNMPv1Information Disclosure65
3NetBIOSNetwork Reconnaissance60
4SMBv1Remote Code Execution80
5WEPWireless Data Interception75
6A...
Reza Rashidi
Clingendael brengt rapport uit over veiligheid Europees internetverkeer
2 years 1 month ago
Europese landen kunnen meer doen om de controle te houden over de veiligheid van het eigen internetverkeer. Dat concludeert denktank Clingendael in vandaag gepubliceerd onderzoek, waartoe de AIVD opdracht gaf.
The Benefits of Microsegmentation for Compliance
2 years 1 month ago
Ravit Greitser
Address the Challenges of Compliance and Cybersecurity with Zero Trust
2 years 1 month ago
The intersection of compliance and cybersecurity is an opportunity for your organization to adopt solutions that simultaneously solve challenges in both areas.
Ravit Greitser
Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety
2 years 1 month ago
Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an...
The post Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety appeared first on McAfee Blog.
Vishnu Varadaraj
NIST Physicist Sae Woo Nam, Pioneer in Single-Photon Detectors, Passes Away
2 years 1 month ago
During his 25-year career at NIST, Sae Woo performed groundbreaking work. He died in January at 53.
Sarah Henderson
NIST Awards Nearly $3 Million for Educational Programs Focused on Circular Economy to Reduce Plastic Waste
2 years 1 month ago
Six universities will create programs to help develop solutions to problems created by the production and consumption of plastics.
Sarah Henderson
Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
2 years 1 month ago
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year
跨界融合,让思想文化更贴近当代人
2 years 1 month ago
许多人陷入漩涡跟着卷,也有人愿意在远方挥一挥智慧之光,让思想文化更贴近当代人。
跨界融合,让思想文化更贴近当代人
2 years 1 month ago
许多人陷入漩涡跟着卷,也有人愿意在远方挥一挥智慧之光,让思想文化更贴近当代人。
跨界融合,让思想文化更贴近当代人
2 years 1 month ago
许多人陷入漩涡跟着卷,也有人愿意在远方挥一挥智慧之光,让思想文化更贴近当代人。
Push vs. Pull-Based Architecture in GitOps
2 years 1 month ago
Akamai
记一次绕过限制进行漏洞利用
2 years 1 month ago
前期通过.git泄露找到了未授权接漏洞,之后在后渗透过程中,利用grafana的payload时,被nginx的normailized处理掉了,所以通过此文介绍如何绕过nginx的normailized进行漏洞利用
Windows Container逆向工程分析
2 years 1 month ago
本文基于windows10,通过逆向工程分析了内核级容器silo的完整实现原理。
Windows Container逆向工程分析
2 years 1 month ago
本文基于windows10,通过逆向工程分析了内核级容器silo的完整实现原理。
Windows Container逆向工程分析
2 years 1 month ago
本文基于windows10,通过逆向工程分析了内核级容器silo的完整实现原理。
Windows Container逆向工程分析
2 years 1 month ago
本文基于windows10,通过逆向工程分析了内核级容器silo的完整实现原理。
Windows Container逆向工程分析
2 years 1 month ago
本文基于windows10,通过逆向工程分析了内核级容器silo的完整实现原理。
Windows Container逆向工程分析
2 years 1 month ago
本文基于windows10,通过逆向工程分析了内核级容器silo的完整实现原理。