Aggregator
Developing the cyber security profession – have your say!
6 years 10 months ago
Chris Ensor discusses the government's proposal to develop the cyber security profession in the UK.
February 2019 Security Update Release
6 years 10 months ago
Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates.
More information about this month’s security updates can be found on the Security Update Guide.
February 2019 Security Update Release
6 years 10 months ago
Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates.
More information about this month’s security updates can be found on the Security Update Guide.
Revisiting How Registrants Can Reduce the Threat of Domain Hijacking
6 years 10 months ago
Recent events1,2 have shown the threat of domain hijacking is very real; however, it is also largely preventable. As Verisign previously noted3, there are many security controls that registrants can utilize to help strengthen their security posture. Verisign would like to reiterate this advice within the context of the recent domain hijacking reports. Domains are […]
The post Revisiting How Registrants Can Reduce the Threat of Domain Hijacking appeared first on Verisign Blog.
Matt Thomas
The Business of Organised Cybercrime
6 years 11 months ago
F5 Labs' David Warburton writes for Professional Security, discussing how your stereotypical perception of cybercrime is all wrong - and what to do about it.
Protecting your Domain Names: Taking the First Steps
6 years 11 months ago
Everyone and everything on the Internet depends on the Domain Name System (DNS) being functional. The DNS has been a common vector for attacks in recent years, and 2019 seems to be no different. Many of these attacks have goals far more sinister than simply taking a company offline or defacing a website; reported attacks include redirecting some or all of an organization's domain to gain access to protected resources, intercept traffic, and even obtain TLS certificates for that domain. Organizations should perform regular DNS reviews and audits. The following guidelines provide a starting point for your review.
Akamai
If I Had to Do It Over Again, Part 2
6 years 11 months ago
More lessons learned from CISOs about “fire and forget,” physical security, the human factor, and audit logging.
If I Had to Do It Over Again, Part 2
6 years 11 months ago
More lessons learned from CISOs about “fire and forget,” physical security, the human factor, and audit logging.
Phishing Attacks Against Facebook / Google via Google Translate
6 years 11 months ago
When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally....
Larry Cashdollar
Safer Internet Day 2019 – Together for a Better Internet
6 years 11 months ago
What You Can Do Today to Help Create a Better Internet Today is Safer Internet Day (SID) – an...
The post Safer Internet Day 2019 – Together for a Better Internet appeared first on McAfee Blog.
Alex Merton-McCann
Anatomy of the seccomp
6 years 11 months ago
Terenceli
thinkphp 5.0.23 rce分析和复现
6 years 11 months ago
hurricane618
【Splunk】使用syslog-ng和HF(UF)收集syslog日志(三)syslog-ng配置
6 years 11 months ago
这部分详细讲讲syslog-ng服务器上的配置
使用Aggressor脚本雕饰Cobalt Strike
6 years 11 months ago
对cobalt strike常见aggressor脚本的简单收集和介绍。
使用Aggressor脚本雕饰Cobalt Strike
6 years 11 months ago
对cobalt strike常见aggressor脚本的简单收集和介绍。
使用Aggressor脚本雕饰Cobalt Strike
6 years 11 months ago
对cobalt strike常见aggressor脚本的简单收集和介绍。
使用Aggressor脚本雕饰Cobalt Strike
6 years 11 months ago
对cobalt strike常见aggressor脚本的简单收集和介绍。
使用Aggressor脚本雕饰Cobalt Strike
6 years 11 months ago
对cobalt strike常见aggressor脚本的简单收集和介绍。
Fighting Back Against Phishing and Fraud—Part 2
6 years 11 months ago
How certificate transparency can help you spot fraudulently registered TLS certificates that exploit your domain or brand name.