Aggregator
从 CVE-2020-17144 看实战环境的漏洞武器化
Actively protecting pen testers and pen testing assets
Today FireEye shared that they were victim of a cyberattack and internal red teaming tooling was accessed by adversaries. More details in this NYT article.
This reminded me that I wanted to do a post on actively protecting pen testers and pen testing assets for a while.
Against persistent adversaries it is only a matter of time when they succeed, not if they will succeed. The big question is do you know when an adversary starts poking around, and when they succeed?
The Three Main Cybersecurity Career Paths
The Three Main Cybersecurity Career Paths
Tomcat容器攻防笔记之Servlet内存马
Tomcat容器攻防笔记之Servlet内存马
Tomcat容器攻防笔记之Servlet内存马
Tomcat容器攻防笔记之Servlet内存马
Tomcat容器攻防笔记之Servlet内存马
Security Update Guide: Let's keep the conversation going
Security Update Guide: Let's keep the conversation going
Phishing Summary 2020—Trends and Highlights
Can Edge Computing Exist Without the Edge? Part 2: Edge Computing
A Balanced DNS Information Protection Strategy: Minimize at Root and TLD, Encrypt When Needed Elsewhere
Over the past several years, questions about how to protect information exchanged in the Domain Name System (DNS) have come to the forefront. One of these questions was posed first to DNS resolver operators in the middle of the last decade, and is now being brought to authoritative name server operators: “to encrypt or not […]
The post A Balanced DNS Information Protection Strategy: Minimize at Root and TLD, Encrypt When Needed Elsewhere appeared first on Verisign Blog.