Linkedin spam: a case study of robust feature engineering toooold 3 years ago Disclaimer: Nothing in this blog is related to the author’s day-to-day work. The content is neither affiliated nor sponsored by any companies. I am not employed by Linkedin.
Risky Business: Determining Malicious Probabilities Through ASNs The Akamai Blog 3 years ago Akamai researchers have analyzed ASNs to determine some shocking stats about the state of malicious IPs and where they are from. Will Rogers
应急响应之流程梳理 猎户攻防实验室 3 years ago 最近做了一些应急响应,在响应的时候也翻查了不少资料,发现大部分都是按照攻击来分类进行响应工作;寻摸着能不能有个一条龙的线路去进行应急响应(毕竟新手,倍感压力),于是粗略的整理了下。
应急响应之流程梳理 猎户攻防实验室 3 years ago 最近做了一些应急响应,在响应的时候也翻查了不少资料,发现大部分都是按照攻击来分类进行响应工作;寻摸着能不能有个一条龙的线路去进行应急响应(毕竟新手,倍感压力),于是粗略的整理了下。
应急响应之流程梳理 猎户攻防实验室 3 years ago 最近做了一些应急响应,在响应的时候也翻查了不少资料,发现大部分都是按照攻击来分类进行响应工作;寻摸着能不能有个一条龙的线路去进行应急响应(毕竟新手,倍感压力),于是粗略的整理了下。