Aggregator
浅析DevOps中结合IAST的落地介绍 - admin-神风
3 years 9 months ago
前言 这篇博客打算重点介绍一下IAST相关的内容,以及IAST如何在DevSecOps中的CI/CD中的结合。做一期大杂烩,同时也是对我这半年多来的实习一次技术总结。 大致需要了解的内容为: CI/CD的介绍 DevOps的介绍 IAST的介绍 在Jenkins流水线引入IAST CI/CD的介绍
admin-神风
警钟长鸣,勿忘国耻,吾辈自强
3 years 9 months ago
警钟长鸣,勿忘国耻,吾辈自强
3 years 9 months ago
警钟长鸣,勿忘国耻,吾辈自强
3 years 9 months ago
Web应用组件自动化发现的探索
3 years 9 months ago
另一种方式的指纹识别
DDoS Chart Toppers?BPS, PPS and RPS Greatest Hits
3 years 9 months ago
New to the scene, monster-sized botnet M?ris is raising some eyebrows with giant requests per second (rps) attacks as shared by Cloudflare (17.2M rps, reported August 19), Yandex (peaking at 21.8M rps on September 5), and KrebsOnSecurity (2M rps on September 9). Some commentary came in on Slashdot, The Record, and The Hacker News.
Tom Emmons
美团外买APP设备指纹风控分析一(初始化)
3 years 9 months ago
设备指纹技术是使用更多的信息来完成对终端设备的唯一性识别,在业务中可以有效辨别设备是真实用户还是机器在注册、登录,及时检测出单设备登入多帐号、防止批量注册、登录等操作行为。
美团外买APP设备指纹风控分析一(初始化)
3 years 9 months ago
设备指纹技术是使用更多的信息来完成对终端设备的唯一性识别,在业务中可以有效辨别设备是真实用户还是机器在注册、登录,及时检测出单设备登入多帐号、防止批量注册、登录等操作行为。
美团外买APP设备指纹风控分析一(初始化)
3 years 9 months ago
设备指纹技术是使用更多的信息来完成对终端设备的唯一性识别,在业务中可以有效辨别设备是真实用户还是机器在注册、登录,及时检测出单设备登入多帐号、防止批量注册、登录等操作行为。
Learn How Akamai Enables AI Powered Analytics Tools to Reduce Water Losses
3 years 9 months ago
The Accelerator Program, a flagship initiative of Akamai India?s Corporate Social Responsibility Trust, enables early-stage innovations for water conservation. Over the past two years, along with our mentoring partner, the International Center for Clean Water (ICCW; an initiative of the Indian Institute of Technology Madras), we onboarded two social innovators as Cohort 1 grantees: Ashoka Trust for Research in Ecology and the Environment and Foundation for Environmental Monitoring, and two social innovators as Cohort 2 grantees, SmartTerra and Jaljeevika.
Sushma Shashidhara
Kinsing evolves, adds Windows to attack list
3 years 9 months ago
The campaign was first seen by the Akamai SIRT on February 16, 2021, and appears to be targeting both Windows and Linux systems. The botnet caught our interest because it has shown to be highly active across a diverse set of geographical regions, including the Americas, Europe, and Asia.
Evyatar Saias
Capoae Malware Ramps Up: Uses Multiple Vulnerabilities and Tactics to Spread
3 years 9 months ago
Recently, there has been a plethora of UPX packed crypto-mining malware written in Golang targeting Linux systems and web applications popping up in the news. The malware?s primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they?ve been infected, these systems are then used to mine cryptocurrency. I?ve named the sample I examined for this post ?Capoae,? based on the code?s output to my terminal.
Larry Cashdollar
【公告】请移步 Red0 安全团队公众号
3 years 9 months ago
本公众号为个人安全技术分享号,已运营近4年时间,期间感谢大家的持续关注!近期,由于个人工作繁忙
【公告】请移步 Red0 安全团队公众号
3 years 9 months ago
本公众号为个人安全技术分享号,已运营近4年时间,期间感谢大家的持续关注!近期,由于个人工作繁忙
【公告】请移步 Red0 安全团队公众号
3 years 9 months ago
本公众号为个人安全技术分享号,已运营近4年时间,期间感谢大家的持续关注!近期,由于个人工作繁忙
【公告】请移步 Red0 安全团队公众号
3 years 9 months ago
本公众号为个人安全技术分享号,已运营近4年时间,期间感谢大家的持续关注!近期,由于个人工作繁忙
【公告】请移步 Red0 安全团队公众号
3 years 9 months ago
本公众号为个人安全技术分享号,已运营近4年时间,期间感谢大家的持续关注!近期,由于个人工作繁忙
【公告】请移步 Red0 安全团队公众号
3 years 9 months ago
本公众号为个人安全技术分享号,已运营近4年时间,期间感谢大家的持续关注!近期,由于个人工作繁忙
【公告】请移步 Red0 安全团队公众号
3 years 9 months ago
本公众号为个人安全技术分享号,已运营近4年时间,期间感谢大家的持续关注!近期,由于个人工作繁忙