Aggregator
JRASP产品检测原理分析
2 years 4 months ago
“Runtime application self-protection”一词,简称为RASP,属于一种新型应用安全保护技术,它将防护功能"注入"到应用程序中,与应用程序融为一体,通过Hook少量关键函数,来实时观测程序运行期间的内部情况。
API接口安全规范
2 years 4 months ago
最近在做API相关的安全研究,整理了一篇API接口安全规范的文章,供大家参考学习。
Diversity Works NZ award for GCSB and NZSIS
2 years 4 months ago
EE | Sipeed 荔枝派 LicheeRV | 1 开箱及上手入门
2 years 4 months ago
有新玩具了!最近整了个Sipeed 荔枝派 LicheeRV Dock 全志D1开发板,这篇博客就来记录一下开箱和上手的一些折腾过程。
MiaoTony
BigID数据合规产品调研
2 years 4 months ago
调研了一下BigID的产品
安全防御体系建设
2 years 4 months ago
这个号叫安全防御,也应该分享一点个人在安全防御方面的一些心得。
代码审计之路之白盒挖掘机 | 技术精选0143
2 years 4 months ago
学生自用挖掘机99新
How to Pen Test the C-Suite for Cybersecurity Readiness
2 years 4 months ago
How do you help the C-Suite understand the business risks of cybersecurity? Put them in the equivalent of a cybersecurity escape room.
Now Available on GitHub: Akamai CLI Utility v1.0 for Akamai Terraform
2 years 4 months ago
With v0.9 of the Akamai CLI for Terraform, application development teams can build on infrastructure as code (IaC) and maintain rapid development without compromising security.
Alfred Chung
CVE-2022-26113: FortiClient Arbitrary File Write As SYSTEM
2 years 4 months ago
The post CVE-2022-26113: FortiClient Arbitrary File Write As SYSTEM appeared first on Rhino Security Labs.
David Yesland
Safe3新版WAF“南墙”试用
2 years 4 months ago
Safe3创业了,即将发布一款WAF——“南墙”
疑似借助某知名国产CRM系统的勒索攻击爆发?别怕,AXDR有招!
2 years 4 months ago
这波勒索病毒的爆发已过去2天有余,造成的损失不可估量
新旧对比:信息网络犯罪案件适用刑事诉讼程序意见
2 years 4 months ago
刚才,“两高一部”联合发布信息网络犯罪案件适用刑事诉讼程序意见,我们做了一个比对,供各位研究参考。
基于netfilter的后门
2 years 4 months ago
NFLOG在蜜罐、后门实现时都能用上
2022网鼎杯白虎组部分wp(新增re-junk)
2 years 4 months ago
Springboot之Actuator信息泄露漏洞利用
2 years 4 months ago
Springboot之Actuator信息泄露漏洞利用
New Prolexic Partner Megaport Now Live in Australia
2 years 4 months ago
As part of Akamai?s focus on serving local market needs, we are thrilled to announce new Prolexic connectivity options via Megaport Elastic Fabric in Australia.
Greg Burns
PureCrypter is busy pumping out various malicious malware families
2 years 4 months ago
In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to "promote", i.e., download and run other malware on the infected machine. According to our observations, most loaders are
wanghao
方法论 | 我与入侵检测的二三事儿
2 years 4 months ago
总结毕业后的六年经历,从扫描器萌新,到入侵检测的“青年”油条,希望能对各位有一些参考价值。一、扫描器18年的