Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Threat Hunting for Unusual DNS Requests

Searching for Unusual DNS Requests is a standard method for threat hunting. The presence of Unusual DNS Requests can often tip off Information Security professionals to attackers trying to gain entry...

View Article


Image may be NSFW.
Clik here to view.

The Case for Simple (But Not Too Simple) Automated Environments

Daniel Riedel Daniel Riedel is the CEO of New Context, an innovator in data security for highly regulated industries. He’s a trusted authority in data security for the industrial internet, speaking...

View Article


Image may be NSFW.
Clik here to view.

Threat Hunting for Unusual Logon Activity

What is one of the first things that you think of when thinking of potential threat activity on your network? Most would probably say that there has been some unusual login activity occurring, either...

View Article

Threat Hunting for Domains as an IOC

Introduction When threats are detected on a network, domains can serve as good indicators that the network is compromised. In many cases, this compromise could have been detected in time for an...

View Article

DevSecOps: What All DevOps Should Be

Today the value of DevOps is well understood, at least by IT professionals. In the IT community, DevOps is almost universally accepted as being superior to traditional software development. By breaking...

View Article


Image may be NSFW.
Clik here to view.

Da Vinci’s birds, SCOTUS, and intelligent hospitality (Issue 35)

Welcome to Issue 35 of the All Turtles newsletter. Each week, we bring you carefully chosen news and analysis about AI, startups, and happenings at the All Turtles startup studio. If you like this...

View Article

Image may be NSFW.
Clik here to view.

Azure AD login for Linux VMs from a security perspective

Hello Azure enthusiasts, have you heard about Azure AD login for linux VMs, a new preview feature on Azure AD? Have you given it a try? Well, I have and currently, I’m not yet fully convinced if it’s a...

View Article

Threat Hunting for File Hashes as an IOC

Threat Hunting is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” This is a proactive measure...

View Article


Image may be NSFW.
Clik here to view.

Unified Security Data: A Simple Idea to Combat Persistent, Complex Cyberattacks

Do you know what happens to your data when it's not in use? If the answer is no, you need to fix that. When cyberattacks take place in enterprises, the resulting data lives in various siloes: security...

View Article


Security+: Technologies And Tools Firewall

Firewalls are an integral part of most organizations’ Information Technology environments today. They control traffic that enters and leaves the network by either allowing or denying traffic and are a...

View Article

Security+: Technologies And Tools NIPS / NIDS

Introduction Network Intrusion Protection Systems (NIPS) and Network Intrusion Detection Systems (NIDS) are tested on the Technologies and Tools portion of the Security+ certification exam. This...

View Article

Dixons Carphone: 2017 data breach affected 10 million

European electronics and telecom retailer Dixons Carphone said a breach of its systems last year could have resulted in attackers accessing roughly 10 million records, including customers’ personal...

View Article

Image may be NSFW.
Clik here to view.

Anatomy of a Kafka CVE

With the recent disclosure of CVE-2018-1288 that affected Kafka, we decided to release a blog post with a few more details about the issue. Affected releases: First of all, you should upgrade to one...

View Article


Image may be NSFW.
Clik here to view.

BEECOOL创始人朱潘:90后“黑客”掘金记|金色财经专访

导读: “我希望推动行业发展:我做了投资、孵化、PR全段,提供免费工位,吸引更多大学生进入到区块链行业中来。”采访中,朱潘眼周似有光芒闪动,他说,“因为这个行业极有可能是下一次‘互联网革命’。” 几周前,雷军一身熨帖蓝色西装,意气风发步入港交所,敲响了人生第二次上市锣。那一天,港交所内场被内地观光团围得水泄不通,雷军的“造富故事”被媒体广泛传播。...

View Article

Image may be NSFW.
Clik here to view.

物联网应用认证:TPM2.0助力

随着可信平台模块2.0(Trusted Platform Module,简称TPM)的日益普及,嵌入式系统安全专家Mocana公司正期待利用该技术,以帮助改进嵌入式物联网设备中的安全更新和容器部署等问题。 近日,物联网安全公司Mocana正式宣布,其将支持可信赖平台模块(TPM)2.0标准,以帮助提高构成物联网(IoT)的嵌入式设备的安全性。 TPM...

View Article


Image may be NSFW.
Clik here to view.

Understanding keys is key to understanding

The newest CipherTrust Cloud Key Manager capability CipherTrust Cloud Key Manager is a multi-cloud encryption key management solution ideal for customers using Microsoft Azure Key Vault , Amazon Web...

View Article

Image may be NSFW.
Clik here to view.

中国金融机构评估DDoS防护提供商的四项重要标准

常言道“无论规模大小,任何金融机构都难逃DDoS攻击一劫”。2017年6月,黑客组织Anonymous与Armada Collective就再次露面,针对包括多家金融机构在内的全球企业实施了一系列恶意行动。这些黑客团体不仅对包括中国人民银行与香港金融管理局在内的近140家机构发起了DDoS攻击、展示了极大的危害性,还向这些受害者发送勒索信索要大额赎金,以此换取攻击停止。...

View Article


Image may be NSFW.
Clik here to view.

更安全的Web通信HTTPS

阅读本篇需要对HTTP协议有最基本的了解。 借用《图解密码技术》里的图片,我们以如下一个购物场景开始介绍: 在网购过程中,如果使用纯粹的HTTP协议,那么用户的账号密码,信用卡,银行卡信息都将在信息传输过程中直接裸奔。从例子中我们可以看到信用卡信息直接被明文传输了。除了明文传输之外,还存在着以下两个问题: 无法验证通信方身份的真实性,即无法确认对方是否是真正的商家。...

View Article

Image may be NSFW.
Clik here to view.

CNCERT:2018年4月互联网安全威胁报告

本报告以CNCERT监测数据和通报成员单位报送数据作为主要依据,对我国互联网面临的各类安全威胁进行总体态势分析,并对重要预警信息和典型安全事件进行探讨。 2018年4月,互联网网络安全状态整体评价为良。主要数据如下: 境内感染网络病毒的终端数为近85万余个;...

View Article

Bad Product Ideas

PeerTube, the “Decentralized YouTube”, succeeds in crowdfunding I'm seeing folly all over the startup and tech landscape. The Yuser app wants to be the next Facebook - with the added wrinkle that...

View Article
Browsing all 12749 articles
Browse latest View live