Aggregator
2024年1月25日,Jenkins 官方披露 CVE-2024-23897 Jenkins CLI 任意文件读取漏洞。
两三年前写的蜜罐开源了
2 years 2 months ago
darkless
3 CIS Resources to Help You Drive Your Cloud Cybersecurity
2 years 2 months ago
Once you've migrated to the cloud, you need to prioritize your cloud cybersecurity. These three resources from CIS can help.
Introducing the Mutator Kit: Creating Object File Monstrosities with Sleep Mask and LLVM
2 years 2 months ago
This is a joint blog written by William Burgess (@joehowwolf) and Henri Nurmi (@HenriNurmi). In our ‘Cobalt Strike and YARA: Can I Have Your Signature?’ blog post, we highlighted that the sleep mask is a common target for in-memory YARA signatures. In that post we recommended using the evasive sleep mask option to scramble the [...]
The post Introducing the Mutator Kit: Creating Object File Monstrosities with Sleep Mask and LLVM appeared first on Cobalt Strike.
William Burgess
iOS RE 4 beginners 1 - MachO && class-dump
2 years 2 months ago
roadmap
之前在 iosre看到一张比较系统的iOS逆向学习路线图,因为接触过一段时间macOS上服务的漏洞挖掘,所以对*OS安全还是挺有兴趣的,也一直想系统性地学习下iOS逆向,之前的一直不成体系,也很零碎,正好对着这个图重构下知识体系。
muhe
What Is API Detection and Response?
2 years 2 months ago
Edward Roberts
API Security: Best Practices for API Activity Data Acquisition
2 years 2 months ago
Abigail Ojeda
New Year, New Initiatives for the NIST Privacy Framework!
2 years 2 months ago
It’s been four years since the release of The NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0. Since then, many organizations have found it highly valuable for building or improving their privacy programs. We’ve also been able to add a variety of resources to support its implementation. We’re proud of how much has been accomplished in just a few short years, but we’re not resting on our laurels. As another, more famous, Dylan once said, “the times they are a-changin’.” For example, the past year has seen the release of the NIST AI Risk
Dylan Gilbert
启明星辰ADLab:工控设备数据安全研究
2 years 2 months ago
工业互联网是传统制造业数字化转型的必然选择,工控设备数据安全在工业数据安全中具有关键地位。本文旨在探讨数据安全体系建设中,围绕工控设备数据构建的防御机制和薄弱点。通过具体案例揭示工业数据安全问题的实际影响。
第1期 | “电子数据取证分析师”报名通道已开启!
2 years 2 months ago
USB驱动器无法识别的修复方案
2 years 2 months ago
第1期 | “电子数据取证分析师”报名通道已开启!
2 years 2 months ago
USB驱动器无法识别的修复方案
2 years 2 months ago
第1期 | “电子数据取证分析师”报名通道已开启!
2 years 2 months ago
USB驱动器无法识别的修复方案
2 years 2 months ago
第1期 | “电子数据取证分析师”报名通道已开启!
2 years 2 months ago
USB驱动器无法识别的修复方案
2 years 2 months ago
NCSC for Startups: Playing cyber criminals at their own game
2 years 2 months ago
CounterCraft's co-founder, Dan Brett, explains how they turn the tables so that social engineering can be used to protect organisations from attackers.
密码保护:某国产防泄密沙盒绕过漏洞
2 years 2 months ago
无法提供摘要。这是一篇受保护的文章。
Zgao
大模型会踹破我们的专业门槛吗?
2 years 2 months ago
信创联盟会议网络安全分享交流的笔记,主题是大模型在安全领域的应用探讨。