Aggregator
Your Best Defense Against Ransomware: Akamai + Guardicore
3 years 4 months ago
For decades, Akamai has been focused on solving tough problems for our customers. We started by addressing the challenges of the ?World Wide Wait,? and quickly started to leverage our edge network?s scale, proximity to users, and expert operations staff to mitigate security threats for our customers. Today, Akamai has category-leading solutions including DDoS, web app and API protection, bot management, and Zero Trust Network Access. Given the incredible surge in ransomware attacks, we are excited to be adding Zero Trust segmentation to our portfolio through the acquisition of Guardicore.
Ari Weil
Ransomware attackers down shift to 'Mid-Game' hunting in Q3 2021
3 years 4 months ago
Ransomware attacks continued to proliferate in Q3 as governments and law
enforcement ratchet up the pressure of the cyber extortion economy
Bill Siegel
【文末免费领门票】KCon 2021 亮点揭秘及议程公布
3 years 4 months ago
新鲜出炉,敬请期待!
【漏洞分析】Oracle MySQL JDBC XXE漏洞(CVE-2021-2471)
3 years 4 months ago
阿里云安全团队向Oracle官方报告了MySQL JDBC XXE漏洞
免费 CDN 玩法 —— 文件一键上传到 NPM - EtherDream
3 years 4 months ago
使用文件 Hash 值作为 NPM 包版本号,无需维护每个文件的版本状态
EtherDream
The 2021 TLS Telemetry Report
3 years 4 months ago
Creating an encrypted HTTPS website depends on a lot more than simply throwing a digital certificate at it and hoping for the best. In fact, Transport Layer Security (TLS) and HTTPS misconfigurations are now so commonplace that in the 2021 OWASP Top 10, Cryptographic Failures now comes in second place....
通过ACL维持域控权限
3 years 4 months ago
半块西瓜皮
Offensive BPF: Understanding and using bpf_probe_write_user
3 years 4 months ago
This post is part of a series about Offensive BPF to learn how BPFs use will impact offensive security, malware, and detection engineering.
Click the “ebpf” tag to see all relevant posts.
Building advanced BPF programs So far in this Offensive BPF series the focus was on bpftrace to build and run BPF programs.
The next thing I wanted to investigate is what options are available to modify data structures during BPF execution.
关于BGP那些事儿
3 years 4 months ago
这是Facebook创立以来最严重的一次网络访问事故,在这起故障中,我们又看到了BGP的身影
从虚假的XSS到放弃RCE再到Self-RCE
3 years 4 months ago
文章开始前,说点题外话,接上次转发的文章(端内钓鱼,反制蚁剑)后台反馈下来的消息看,大家普遍都没整明白这波是什么操作
Over 25% of Malicious JavaScript Is Being Obfuscated
3 years 4 months ago
Last year, Akamai released research on obfuscation techniques being used by cybercriminals to create malicious JavaScript. The code is unreadable, un-debuggable, and as a result, much more challenging to analyze and detect.
Or Katz
NCSC For Startups diaries: PORGiESOFT
3 years 4 months ago
We caught up with George Brown, founder of PORGiESOFT, about his first few weeks in NCSC For Startups...
《Go语言设计与实现》纸质书诚邀读者评论
3 years 4 months ago
《Go语言设计与实现》纸质书预计11月下旬出版,征集 5 条读者评论作为推荐语!
Scoop the Windows 10 pool! 翻译 & 复现
3 years 4 months ago
堆溢出是应用程序中相当常见的漏洞。利用这些漏洞通常需要对堆的底层管理机制非常了解。Windows10最近改变了内核中堆的管理方式,本文旨在介绍Windows NT内核堆管理机制的最新发展,同时介绍对内核池的新的利用技术
What Microsoft Bing?s IndexNow Means for CDN Users
3 years 4 months ago
Microsoft Bing today announced the rollout of IndexNow, a new protocol designed in conjunction with Yandex that can allow ?websites to easily notify search engines whenever their website content is created, updated, or deleted.? The goal is to reduce the amount of time it takes for search engines to discover and index website changes ? a process often measured in days and even weeks ? to mitigate traffic loss and the potential adverse effects on customers and even revenues.
Jon Alexander
SSRF漏洞基础
3 years 4 months ago
YangHao
Yar 源码阅读笔记:开篇
3 years 4 months ago
前言 本文是 Yar 源码系列的第一篇文章,主要介绍 Yar 以及服务端、客户端的基本使用,详细的源码分析会放在后续的文章中。 为什么要研究 Yar? 我从 8 月初开始阅读 《P
信息安全风险管理的基本功
3 years 4 months ago
实际工作中的一些思考,欢迎交流
六年后的北京之旅
3 years 4 months ago
我爱这精彩的世界
交织着太多的悲喜
我爱这精彩的电影
如梦幻如空花
我那总沉默的朋友
你让我感觉到力量
曾在我心中的伤痛
如过眼的云烟