Aggregator
零信任体系基础
4 years ago
零信任体系基础
4 years ago
Protecting Critical Systems with Isolation and Jump Boxes
4 years ago
Managing hardened systems without exposing them to unwanted attack vectors is difficult. Jump boxes are one way to do it—learn why and how.
Protecting Critical Systems with Isolation and Jump Boxes
4 years ago
Managing hardened systems without exposing them to unwanted attack vectors is difficult. Jump boxes are one way to do it—learn why and how.
What Is a TCP Three-Way Handshake?
4 years ago
The TCP three-way handshake is one of the critical building blocks of the internet. It facilitates the smooth and consistent flow of information across and among different networks without compromising security.
Akamai
null Study Groups Round 2 - Learning Security & Building Networks
4 years ago
null is one of the most active, open security communities since 2010. One of the main objectives for null is spreading information security awareness. Keeping that aim in mind, null has started null Study Groups. About null Study Groups null Study Group is a place where like-minded people get together and learn about different domains of security like web, cloud, etc.
为 CodeQL 自定义规则编写测试文件
4 years ago
本文主要介绍如何为自定义的 CodeQL 规则创建测试文件,以及如何使用 test run 子命令执行测试。
为 CodeQL 自定义规则编写测试文件
4 years ago
TonghuaRoot
浅析DevOps中结合IAST的落地介绍 - admin-神风
4 years ago
前言 这篇博客打算重点介绍一下IAST相关的内容,以及IAST如何在DevSecOps中的CI/CD中的结合。做一期大杂烩,同时也是对我这半年多来的实习一次技术总结。 大致需要了解的内容为: CI/CD的介绍 DevOps的介绍 IAST的介绍 在Jenkins流水线引入IAST CI/CD的介绍
admin-神风
警钟长鸣,勿忘国耻,吾辈自强
4 years ago
警钟长鸣,勿忘国耻,吾辈自强
4 years ago
警钟长鸣,勿忘国耻,吾辈自强
4 years ago
Web应用组件自动化发现的探索
4 years ago
另一种方式的指纹识别
DDoS Chart Toppers—BPS, PPS and RPS Greatest Hits
4 years ago
New to the scene, monster-sized botnet Mēris is raising some eyebrows with giant requests per second (rps) attacks as shared by Cloudflare (17.2M rps, reported August 19), Yandex (peaking at 21.8M rps on September 5), and KrebsOnSecurity (2M rps on September 9). Some commentary came in on Slashdot, The Record, and The Hacker News.
Tom Emmons
美团外买APP设备指纹风控分析一(初始化)
4 years ago
设备指纹技术是使用更多的信息来完成对终端设备的唯一性识别,在业务中可以有效辨别设备是真实用户还是机器在注册、登录,及时检测出单设备登入多帐号、防止批量注册、登录等操作行为。
美团外买APP设备指纹风控分析一(初始化)
4 years ago
设备指纹技术是使用更多的信息来完成对终端设备的唯一性识别,在业务中可以有效辨别设备是真实用户还是机器在注册、登录,及时检测出单设备登入多帐号、防止批量注册、登录等操作行为。
美团外买APP设备指纹风控分析一(初始化)
4 years ago
设备指纹技术是使用更多的信息来完成对终端设备的唯一性识别,在业务中可以有效辨别设备是真实用户还是机器在注册、登录,及时检测出单设备登入多帐号、防止批量注册、登录等操作行为。
Learn How Akamai Enables AI Powered Analytics Tools to Reduce Water Losses
4 years ago
The Accelerator Program, a flagship initiative of Akamai India’s Corporate Social Responsibility Trust, enables early-stage innovations for water conservation. Over the past two years, along with our mentoring partner, the International Center for Clean Water (ICCW; an initiative of the Indian Institute of Technology Madras), we onboarded two social innovators as Cohort 1 grantees: Ashoka Trust for Research in Ecology and the Environment and Foundation for Environmental Monitoring, and two social innovators as Cohort 2 grantees, SmartTerra and Jaljeevika.
Sushma Shashidhara
Kinsing evolves, adds Windows to attack list
4 years ago
The campaign was first seen by the Akamai SIRT on February 16, 2021, and appears to be targeting both Windows and Linux systems. The botnet caught our interest because it has shown to be highly active across a diverse set of geographical regions, including the Americas, Europe, and Asia.
Evyatar Saias