Aggregator
喜马拉雅SRC秋季活动
5 years 6 months ago
Unprecedented Levels of Ransom DDoS Extortion Attacks
5 years 6 months ago
The FBI has released a flash warning that thousands of organizations around the world, and across multiple industries, have been threatened with DDoS attacks unless they pay a bitcoin ransom. This ransom DDoS, or RDoS, threat was covered by Akamai's Security Intelligence Response Team (SIRT) in a Security Alert released on August 17, 2020.
Ari Weil
When Hackers Take Advantage of Your Trusted Vendors
5 years 6 months ago
As JavaScript-based client-side attacks continue to evolve, we see how attackers are getting more sophisticated and employing more advanced techniques. Unfortunately, it has been proven many times that any website partner can be exploited to carry out an attack. In the past month, we witnessed one of the most popular and trusted vendors being used as a credit card data exfiltration vector -- Google Analytics.
Ziv Eli
My qemu/kvm book has been publicated
5 years 6 months ago
Terenceli
The Disappearing IT Security Budget: A 2020 Cybersecurity Crisis
5 years 6 months ago
As COVID-19 shrinks IT security budgets, security teams must shift their spending and update operations plans to support this new normal.
The Disappearing IT Security Budget: A 2020 Cybersecurity Crisis
5 years 6 months ago
As COVID-19 shrinks IT security budgets, security teams must shift their spending and update operations plans to support this new normal.
The Disappearing IT Security Budget: A 2020 Cybersecurity Crisis
5 years 6 months ago
As COVID-19 shrinks IT security budgets, security teams must shift their spending and update operations plans to support this new normal.
kvm performance optimization technologies, part one
5 years 6 months ago
Terenceli
Machine Learning Attack Series: Brute forcing images to find incorrect predictions
5 years 6 months ago
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
The previous four posts explained the architecture and how Husky AI was built, threat modeled and deployed. Now it’s time to start the attacks and build mitigations. The appendix in this post shows all the attacks I want to research and perform in this series over the next few weeks/months.
VIPKID SRC助力华山论剑•2020网络安全大会发出网络安全“西安”声音
5 years 6 months ago
华山论剑·2020网络安全大会(第三届全国信息安全企业家高峰论坛暨第五届SSC安全峰会)将于10月14至15
VIPKID SRC助力华山论剑•2020网络安全大会发出网络安全“西安”声音
5 years 6 months ago
华山论剑·2020网络安全大会(第三届全国信息安全企业家高峰论坛暨第五届SSC安全峰会)将于10月14至15
Web Application and API Protection: From SQL Injection to Magecart
5 years 6 months ago
SQL injections were first discovered in 1998, and over 20 years later, they remain an unsolved challenge and an ongoing threat for every web application and API. The Open Web Application Security Project (OWASP) highlighted injection flaws in its Top 10 lists for both web application security risks and API security threats.
Renny Shen
聊聊Google的工程实践(二)
5 years 6 months ago
推荐基本和谷歌有关的书籍,以及几个前谷歌技术人的公众号。
聊聊Google的工程实践(二)
5 years 6 months ago
推荐基本和谷歌有关的书籍,以及几个前谷歌技术人的公众号。
聊聊Google的工程实践(二)
5 years 6 months ago
推荐基本和谷歌有关的书籍,以及几个前谷歌技术人的公众号。
开源信息收集周报#56
5 years 6 months ago
本报告部分引自Week in OSINT栏目,每周推荐好玩实用的工具,站点,技巧,文章等,适用于任何领域的研究人员,分析测试人员。
开源信息收集周报#56
5 years 6 months ago
本报告部分引自Week in OSINT栏目,每周推荐好玩实用的工具,站点,技巧,文章等,适用于任何领域的研究人员,分析测试人员。
Every Application Should Be Behind a WAF
5 years 6 months ago
It's no secret that security threats continue to expand in volume and variety, making headlines on virtually a daily basis. From nation-state attacks, corporate espionage, and data exfiltration campaigns to all-in-one and sneaker bot campaigns, businesses across the globe find themselves dealing with a deluge of inbound threats. The increased amount and variation of threats, and the proliferation of apps being deployed and managed by teams and individuals across the enterprise, can make securing apps and data feel like trying to keep water out of a submerged sieve.
Ari Weil
DDCTF 2020 Writeup
5 years 6 months ago
今年改了赛制, 可以两人组队, 我觉得改的还是不错的, 终于不用现场表演学习逆向和 pwn 了, 成功和 Ary 师傅打到了第三 233