Aggregator
2020RCTF 几道pwn题的复现
4 years 3 months ago
博客长草严重,上半年摸鱼太久。最近趁着有空开始复现之前的一些题目,这次做了2020RCTF的几道pwn题,本来还想着把MIPS那道题做出来再发,结果发现MIPS的调试还有很多问题,所以就先发常规一点的题。
hurricane618
Edgeworkers Use Story: Creating High-Performing, Individualized Campaign Responses in Online Retail
4 years 3 months ago
As campaigns and digital experiences become more individualized, they can create a challenge for delivering content to consumers at the highest velocity. Having each paid search, social media, and email marketing campaign add unique query string parameters to requests is critical for tracking the ROI of a company's marketing spend. This pursuit of granular user data can place a stubborn limit on the ability of B2C companies to maximize the benefits of cached content -- particularly in terms of maximizing offload of content delivery.
Gregory Griffiths
2020强网杯 强网先锋のpwn
4 years 3 months ago
hurricane618
Computing at the Edge
4 years 3 months ago
Welcome to the Akamai October 2020 Update - a week of product updates, new features, and innovations. We'll be highlighting a different area of our portfolio each day this week. In today's post, we look at our enhanced edge computing capabilities and how they help developers more effectively and rapidly improve customer experiences on the Akamai platform.
Gregory Griffiths
Machine Learning Attack Series: Stealing a model file
4 years 3 months ago
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
Overview: How Husky AI was built, threat modeled and operationalized Attacks: The attacks I want to investigate, learn about, and try out We talked about creating adversarial examples and “backdoor images” for Husky AI before. One thing that we noticed was that an adversary with model access can very efficiently come up with adversarial examples.
某期间用到的溯源技巧
4 years 3 months ago
前几周用到的溯源技巧。
基于对象存储隧道的远控工具开源啦
4 years 3 months ago
基于亚马逊S3\阿里云OSS\腾讯COS通信隧道的远程管理工具
Coming up: Grayhat Red Team Village talk about hacking a machine learning system
4 years 3 months ago
Excited to announce that I will be presenting at Grayhat - Red Team Village on October 31st 2020. The presentation is about my machine learning journey and how to build and break a machine learning system.
If you follow my blog, you can guess that there will be lots of discussion around “Husky AI”. The bits and pieces that make up a machine learning pipeline, and how to threat model such a system.
Proliferation of Mobile Devices: The Impact on Consumer Security
4 years 3 months ago
As the use of mobile devices continues to skyrocket worldwide, a new danger is silently emerging against consumers. This article delves into the deep end of how the proliferation of mobile devices is impacting consumer security
The post Proliferation of Mobile Devices: The Impact on Consumer Security appeared first on McAfee Blog.
McAfee
Success at New Zealand Rainbow Excellence Awards 2020
4 years 3 months ago
从安全切面到Security Mesh
4 years 3 months ago
理解切面防御的关键在于明白它不是安全防御的目标,而是建设的过程和手段。
Education's Digital Future and the End of Snow Days
4 years 3 months ago
Healthcare dramatically adjusted due to the COVID-19 pandemic. But parents around the world are much more concerned with education. F5 Labs' Preston Hogue writes for SecurityWeek, describing how the traditional classroom was turned on its head in a matter of weeks, and which of those changes will be...
聊聊微信读书
4 years 3 months ago
聊聊读书的需求,以及微信读书这个产品。
WarezTheRemote: Turning Remotes into Listening Devices
4 years 3 months ago
Television remotes have gotten little attention as a potential attack vector ? despite being one of the most common household devices you can find.
JJ Lehmann
Death by a Thousand Cuts: Nuisance DDoS Attacks in the Games Industry
4 years 3 months ago
At Akamai, we talk a lot about DDoS attacks. It's because we're pretty good at handling them. We've stopped many of the world's biggest attacks. And, while less common, they get a lot of attention. But we can also stop the world's smallest attacks. And we stop lots of them. It's these smaller attacks that we're talking about today.
Jonathan Singer
How Cyber Attacks Changed During the Pandemic
4 years 3 months ago
Cybersecurity attacks surged during the pandemic, with large jumps in DDoS and password login attacks against online retailers and APIs.
Cybersecurity Awareness Month: If You Connect It, Protect It
4 years 3 months ago
Cybersecurity Awareness Month: If You Connect It, Protect It October is Cybersecurity Awareness Month, which is led by the U.S....
The post Cybersecurity Awareness Month: If You Connect It, Protect It appeared first on McAfee Blog.
McAfee
开源信息收集周报#60
4 years 3 months ago
本报告部分引自Week in OSINT栏目,每周推荐好玩实用的工具,站点,技巧,文章等,适用于任何领域的研究人员,分析测试人员。
SharpOSS-利用阿里云OSS实现内网渗透中的快速文件上传
4 years 3 months ago
SharpOSS-利用阿里云OSS实现内网渗透中的快速文件上传