Aggregator
TinyScheme读写文件
7 years 5 months ago
Gorgias
TinyScheme读写文件
7 years 5 months ago
Will Losses from Cryptocurrency Exchange Hacks Hit a Billion Dollars In 2018?
7 years 5 months ago
Cryptocurrency exchanges and their supporting application systems are being attacked at an unprecedented level. As the value of cryptocurrency has climbed, so has the incentive to steal.
Will Losses from Cryptocurrency Exchange Hacks Hit a Billion Dollars In 2018?
7 years 5 months ago
Cryptocurrency exchanges and their supporting application systems are being attacked at an unprecedented level. As the value of cryptocurrency has climbed, so has the incentive to steal.
Will Losses from Cryptocurrency Exchange Hacks Hit a Billion Dollars In 2018?
7 years 5 months ago
Cryptocurrency exchanges and their supporting application systems are being attacked at an unprecedented level. As the value of cryptocurrency has climbed, so has the incentive to steal.
固件提取系列 - SD卡解锁
7 years 5 months ago
通过 Windows 用户模式回调实施的内核攻击
7 years 5 months ago
这篇文章翻译自一篇多年之前的论文,原文作者是 Tarjei Mandt。原文系统地描述了 win32k 的用户模式回调机制以及相关的原理和思想,可以作为学习 win32k 漏洞挖掘的典范。早前曾经研读过,近期又翻出来整理了一下翻译,在这里发出来做个记录。原文链接在文后可见。
稻草小刀
通过 Windows 用户模式回调实施的内核攻击
7 years 5 months ago
这篇文章翻译自一篇多年之前的论文,原文作者是 Tarjei Mandt。原文系统地描述了 win32k 的用户模式回调机制以及相关的原理和思想,可以作为学习 win32k 漏洞挖掘的典范。早前曾经研读过,近期又翻出来整理了一下翻译,在这里发出来做个记录。原文链接在文后可见。
稻草小刀
Security Response Headers
7 years 5 months ago
Security response headers are a critical security capability that all organizations should consider. This blog post is the first in a series that will discuss different security headers and go in-depth with how to configure them for maximum benefit.
Ryan Barnett
The Risk of Triangulation: You May Just be a Piece of the Puzzle
7 years 5 months ago
F5 Labs' Preston Hogue writes for SecurityWeek, discussing how attackers might be targeting your data with an eye on a larger prize.
如何进入Gartner报告?
7 years 5 months ago
能够进入Gartner报告,对于国内很多公司来说,是一个很重要的荣誉。但是实际能进入的公司,却是凤毛麟角。下面我从我们青藤入围的经验来总结介绍一下进入Gartner报告的一些经验。
Fsop Exploit File Structure
7 years 5 months ago
Docker环境、一些问题等
7 years 5 months ago
The Dangers of Linking Your Apple ID to Financial Accounts
7 years 5 months ago
The digital wallets of Chinese citizens are under attack thanks to a few bad apples. A recent string of cyberattacks...
The post The Dangers of Linking Your Apple ID to Financial Accounts appeared first on McAfee Blog.
McAfee
Who Owns Application Security?
7 years 5 months ago
F5 Labs' Ray Pompon writes for Help Net Security, discussing the dismayingly low number of firms whose CISO owns application security.
Linux Kernel Exploitation Part 1: Setting Up Debugging Environment
7 years 5 months ago
Introduction These days I think there is still necessity to write a tutorial series on Linux Kernel exploitation and hope to summarize the kernel exploitation techniques as following: (1) Kernel Debugging (2) Return-oriented-Programming in Kernel (3) Kernel Mitigation: KASLR, SMEP, SMAP (4) Kernel Space Memory Allocator: SLAB Allocator In this post, I will introduce how […]
dangokyo
网络对抗技术-实验四 - Vicen
7 years 5 months ago
中国人民公安大学 Chinese people’ public security university 网络对抗技术 实验报告 实验四 恶意代码技术 学生姓名 年级 2015 区队 四 指导教师 高见 信息技术与网络安全学院 2016年11月7日 实验任务总纲 2018—2019 学年 第 一 学期
Vicen
网络对抗技术-实验三 - Vicen
7 years 5 months ago
中国人民公安大学 Chinese people’ public security university 网络对抗技术 实验报告 实验三 密码破解技术 学生姓名 年级 2015 区队 四 指导教师 高见 信息技术与网络安全学院 2016年11月7日 实验任务总纲 2016—2017 学年 第 一 学期
Vicen
The VORACLE OpenVPN Attack: What You Need to Know
7 years 5 months ago
Many of us know that using a VPN (Virtual Private Network) adds an extra layer of security to our Wi-Fi...
The post The VORACLE OpenVPN Attack: What You Need to Know appeared first on McAfee Blog.
McAfee