Aggregator
动态爬虫漏抓 案例分析(三)
7 years 4 months ago
还有更好的解决方案吗?
Phishing for Information, Part 4: Beware of Data Leaking Out of Your Equipment
7 years 4 months ago
Organizations often overlook the many ways in which their own systems put useful information right into the hands of attackers building cyber scams.
蜜罐与内网安全从0到1(二)
7 years 4 months ago
这一篇有点像综述,花5分钟了解下蜜罐技术发展和应用的点滴。
Python pickle模块爬坑笔记
7 years 4 months ago
python 学习笔记
动态爬虫漏抓的案例分析(二)
7 years 4 months ago
又一发漏抓案例
Four of the coolest jobs in cybersecurity
7 years 4 months ago
This blog post was written by Nick Viney. With the rapid growth of the Internet of Things (IoT) and data...
The post Four of the coolest jobs in cybersecurity appeared first on McAfee Blog.
McAfee
Wirex Android DDoS Malware Adds UDP Flood
7 years 4 months ago
As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.
Six Steps to Finding Honey in the OWASP
7 years 4 months ago
According to Verizon’s 2014 Data Breach Investigations Report, “Web applications remain the proverbial punching bag of the Internet.” Things haven’t improved much since then. What is it about web applications that makes them so...
New App Allows Cybercriminals to Create Customized Ransomware
7 years 4 months ago
From clothes to food – we practically buy everything on the internet these days. That includes ransomware as well. And...
The post New App Allows Cybercriminals to Create Customized Ransomware appeared first on McAfee Blog.
McAfee
docker + 扫描器 == 蜜汁Bug?
7 years 4 months ago
~\(≧▽≦)/~ 八哥你走开!
URL Obfuscation—Still a Phisher’s Phriend
7 years 4 months ago
Cyber crooks use several common URL disguising techniques to trick users into thinking their sham sites are legitimate.
The WireX Botnet: An Example of Cross-Organizational Cooperation
7 years 4 months ago
On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protocol. The WireX botnet comprises primarily Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Akamai InfoSec
Adwind: A cross-platform RAT
7 years 4 months ago
浅谈XSSI漏洞
7 years 5 months ago
一篇虎头蛇尾的番外
Ubuntu 系统下 WiFi 频繁掉线解决方法
7 years 5 months ago
前两天刚解决了 WiFi 的网卡驱动问题,用了没多久又发现新问题了,真是应了那句话,生命在于折腾。 好吧,有了问题光抱怨是没用的,问题还是得解决。 第一步,执行命令
动态爬虫漏抓的案例分析(一)
7 years 5 months ago
因为浏览器嫌你 “太快” 导致的漏抓,你能修复吗?
Laravel 应用部署到 Nginx 服务器上的第一个坑
7 years 5 months ago
前言 在学习了一段时间 Larvel 后,写了个生成短网址小应用,把应用部署到服务器上的时候就出现了问题….. 以此文祭奠我失去的青春… 正文
蜜罐与内网安全从0到1(一)
7 years 5 months ago
将蜜罐技术应用到内网攻击感知中,一篇硕士论文的研究过程与demo实现,抛砖引玉。
Achieving Multi-Dimensional Security Through Information Modeling—Executive Threat Modeling Part 3
7 years 5 months ago
How InfoSec leaders can build successful threat models by defining the threat landscape and its component resources, then asking simple, situational questions.