Aggregator
IBM Security family PAM Content Update 4104.08194
3 years 9 months ago
Summary
PAM update 4104.08194 contains 10 new events, 23 new moderate event responses, and 23 new aggressive event responses.
Threat Type
Vulnerability
Overview
This content update is compatible with IBM QRadar Network Security Firmware version 5.4 or later, IBM QRadar Network Security for VMware firmware version 5.4 or later, IBM Security Network IPS GV-Series Virtual Appliances, IBM Security Network IPS GX-Series Appliances Firmware version 4.5 or later, IBM Security Network Protection XGS Firmware versio
Mozilla Security Advisory for Thunderbird
3 years 9 months ago
Summary
The Mozilla Foundation has issued a Moderate-rated security advisory that addresses multiple vulnerabilities in Thunderbird.
Threat Type
Vulnerability
Overview
The Mozilla Foundation has released Thunderbird 78.9.1 to cover multiple vulnerabilities related to OpenPGP functions. The advisory has been rated as Moderate. The vulnerabilities could potentially result in a failure to send encrypted emails or allow a remote attacker to conduct a spoofing attack. For further details, please refer to the app
我的黑客成长经历 - 叛逆的我
3 years 9 months ago
国家医疗保障局发布关于印发加强网络安全和数据保护工作指导意见的通知
3 years 9 months ago
国家医疗保障局关于印发加强网络安全和数据保护工作指导意见的通知
华为 E5885L 4G路由器折腾笔记
3 years 9 months ago
Introduction
平时出差会用上4G网卡,这款4G路由器太好用了,支持LTE,UMTS,GSM,可以作为充电宝、路由器、上网卡,支持无线有线。通过破解可以自定义IMEI,绕过ICCID与IMEI绑定限制,逃避网络审查。
Gorgias
Taking Action This Earth Month
3 years 9 months ago
There's a fascinating human phenomenon often studied in the behavioral science field called the intention-action gap.
Kenda Carlson
CPU 和 GPU - 异构计算的演进与发展
3 years 9 months ago
世界上大多数事物的发展规律是相似的,在最开始往往都会出现相对通用的方案解决绝大多数的问题,随后会出现为某一场
Gambling, Streaming Traffic Up During Men's College Basketball Tourney
3 years 9 months ago
Gambling industry-related web traffic delivered by Akamai jumped 31% over the category average for all of Q4 2020 on March 31st.
Chris Nicholson
以色列摩萨德针对伊朗核设施进行破坏性网络攻击导致断电
3 years 9 months ago
网络战场再次迎来了核设施网络打击,而这一次攻击还是发生在当年的"震网"攻击发生国伊朗,而攻击者同样是以色列,
IBM X-Force Threat Activity Report - Nimar Backdoor
3 years 9 months ago
Summary
Throughout 2020 IBM X-Force saw a proliferation of malware created using the Go programming language, now some of that focus seems to be shifting onto the Nim programming language, with the latest addition being the Nimar Backdoor.
Threat Type
Vulnerability
Overview
Throughout 2020 IBM X-Force saw a proliferation of malware created using the Go programming language, now some of that focus seems to be shifting onto Nim. Nim is a flexible, statically typed programming language which is notable for hav
一款内网自动化横向工具:InScan开源扫描器
3 years 9 months ago
一款内网自动化横向工具:InScan开源扫描器
浅析 AWS S3 子域名接管漏洞
3 years 9 months ago
0x00 前言哈喽,大家好,我是童话。前段时间和 @鶇 师傅讨论了一个特殊场景下的子域名接管漏洞,蛮 tri
河马查杀支持对冰蝎V3.0 Beta 7检测,无需更新!
3 years 9 months ago
河马查杀支持对冰蝎V3.0 Beta 7 检测,各位管理员朋友们无需升级,可以直接使用。
Android Security Bulletin - April 2021
3 years 9 months ago
Summary
The Android Security Bulletin for April has been released and provides information on the thirty-six vulnerabilities that are addressed in this bulletin.
Threat Type
Vulnerability
Overview
The April security bulletin for Android has been released. In it, thirty-six vulnerabilities are addressed. Some of the potential impacts of successful exploitation of the vulnerabilities are information disclosure, privilege escalation, and remote code execution. Two of the vulnerabilities were rated as "Critical
深度揭密高通4/5G移动基带消息系统和状态机
3 years 9 months ago
背景MarkDown格式可以直接github上查看https://github.com/vessial/ba
Caught on Camera: Rethinking IoT Security
3 years 9 months ago
We all know that we're on camera pretty much constantly -- most coffee shops, convenience stores, and even offices employ security cameras for protection. But what happens when those devices built to keep us safe become unsafe?
Mani Sundaram
Akamai Titans 2020: Celebrating Outstanding Achievements
3 years 9 months ago
To Akamai's Co-Founder Danny Lewin, calling someone a "Titan" was the highest praise he would give. Danny himself was a remarkably talented and hard-working leader whose heart, passion, and spirit still inspire us.
PJ Joseph
Metasploit最新资讯
3 years 9 months ago
Metasploit最新资讯!!新模块*6,功能更新*3,BUG修复*4~
Emerging Edge Computing Use Cases
3 years 9 months ago
The first rule of edge compute thought leadership is: don't overuse the term edge. Over the course of my blog series on the topic, I have defined the edge, explained edge computing, and discussed the economics of edge computing.
Ari Weil