Aggregator
Git漏洞允许任意代码执行(CVE-2018-17456)复现 - Zhengjim
7 years 4 months ago
Git漏洞允许任意代码执行(CVE 2018 17456) 国外安全研究员 joernchen 在 9 月 23 日向 git 官方报告了漏洞的相关细节。10月5日,Git项目披露了一个漏洞,编号为CVE 2018 17456。当用户克隆恶意存储库时,该漏洞可能会导致执行任意代码。 漏洞描述 这个漏
Zhengjim
网络对抗技术-实验五 - Vicen
7 years 4 months ago
中国人民公安大学 Chinese people’ public security university 网络对抗技术 实验报告 实验五 综合渗透 学生姓名 年级 2015 区队 四 指导教师 高见 信息技术与网络安全学院 2016年11月7日 实验任务总纲 2016—2017 学年 第 一 学期 一
Vicen
v8 pipeline
7 years 4 months ago
sakura
TinyScheme读写文件
7 years 4 months ago
Gorgias
TinyScheme读写文件
7 years 4 months ago
Will Losses from Cryptocurrency Exchange Hacks Hit a Billion Dollars In 2018?
7 years 4 months ago
Cryptocurrency exchanges and their supporting application systems are being attacked at an unprecedented level. As the value of cryptocurrency has climbed, so has the incentive to steal.
Will Losses from Cryptocurrency Exchange Hacks Hit a Billion Dollars In 2018?
7 years 4 months ago
Cryptocurrency exchanges and their supporting application systems are being attacked at an unprecedented level. As the value of cryptocurrency has climbed, so has the incentive to steal.
Will Losses from Cryptocurrency Exchange Hacks Hit a Billion Dollars In 2018?
7 years 4 months ago
Cryptocurrency exchanges and their supporting application systems are being attacked at an unprecedented level. As the value of cryptocurrency has climbed, so has the incentive to steal.
固件提取系列 - SD卡解锁
7 years 4 months ago
Security Response Headers
7 years 4 months ago
Security response headers are a critical security capability that all organizations should consider. This blog post is the first in a series that will discuss different security headers and go in-depth with how to configure them for maximum benefit.
Ryan Barnett
The Risk of Triangulation: You May Just be a Piece of the Puzzle
7 years 4 months ago
F5 Labs' Preston Hogue writes for SecurityWeek, discussing how attackers might be targeting your data with an eye on a larger prize.
如何进入Gartner报告?
7 years 4 months ago
能够进入Gartner报告,对于国内很多公司来说,是一个很重要的荣誉。但是实际能进入的公司,却是凤毛麟角。下面我从我们青藤入围的经验来总结介绍一下进入Gartner报告的一些经验。
Fsop Exploit File Structure
7 years 4 months ago
Docker环境、一些问题等
7 years 4 months ago
The Dangers of Linking Your Apple ID to Financial Accounts
7 years 4 months ago
The digital wallets of Chinese citizens are under attack thanks to a few bad apples. A recent string of cyberattacks...
The post The Dangers of Linking Your Apple ID to Financial Accounts appeared first on McAfee Blog.
McAfee
Who Owns Application Security?
7 years 4 months ago
F5 Labs' Ray Pompon writes for Help Net Security, discussing the dismayingly low number of firms whose CISO owns application security.
Linux Kernel Exploitation Part 1: Setting Up Debugging Environment
7 years 4 months ago
Introduction These days I think there is still necessity to write a tutorial series on Linux Kernel exploitation and hope to summarize the kernel exploitation techniques as following: (1) Kernel Debugging (2) Return-oriented-Programming in Kernel (3) Kernel Mitigation: KASLR, SMEP, SMAP (4) Kernel Space Memory Allocator: SLAB Allocator In this post, I will introduce how […]
dangokyo
网络对抗技术-实验四 - Vicen
7 years 5 months ago
中国人民公安大学 Chinese people’ public security university 网络对抗技术 实验报告 实验四 恶意代码技术 学生姓名 年级 2015 区队 四 指导教师 高见 信息技术与网络安全学院 2016年11月7日 实验任务总纲 2018—2019 学年 第 一 学期
Vicen
网络对抗技术-实验三 - Vicen
7 years 5 months ago
中国人民公安大学 Chinese people’ public security university 网络对抗技术 实验报告 实验三 密码破解技术 学生姓名 年级 2015 区队 四 指导教师 高见 信息技术与网络安全学院 2016年11月7日 实验任务总纲 2016—2017 学年 第 一 学期
Vicen