Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Finding Interactive User COM Objects using PowerShell

Easily one of the most interesting blogs on windows behaviour is Raymond Chen's The Old New Thing . I noticed he'd recently posted about using "Interactive User" (IU) COM objects to go from an...

View Article


Image may be NSFW.
Clik here to view.

BSides Idaho Falls Preview: The Industrialization of Red and Blue Teaming

When we think of industrialization and the industrial revolution, images of smoke stacks, purpose-built machinery, and automation come to mind. Some examples are the Jacquard Machine, as pictured...

View Article


零信任安全的灰度哲学

零信任安全最早由著名研究机构Forrester的首席分析师约翰.金德维格(John...

View Article

Image may be NSFW.
Clik here to view.

漏洞治理平台的设计与实现

几个月前笔者曾经梳理过技术方面的漏洞处理的心得,经过几个月的实践和迭代,我们在公司内推出了漏洞治理的概念,并进行实践中。本文就漏洞治理体系的设计和实现的各个环节做个详细的阐述。 适用场景: 业务系统逻辑复杂,部门间关系较复杂,对网络安全敏感性高的环境。(当然内部环境简单的企业也可以采用,但会感觉方案太重) 整体架构: 整体架构从 资产发现 开始,第二个阶段是 漏洞扫描 ,第三个阶段是 漏洞处理...

View Article

Image may be NSFW.
Clik here to view.

去中心化到底为什么重要?我们应该怎么理解去中心化?

前言:去中心化是区块链的一个属性,但也是被普遍误解的一个属性。去中心化到底为什么重要?我们应该怎么理解去中心化?从宏观的角度,作者Chris Dixon做出了很好的阐释,值得细读。本文源于Cdixon.org,由蓝狐笔记社群“Anthony”翻译。 Web1.0 & Web 2.0 互联网web 1.0 - 从20世纪80年代到21世纪初-...

View Article


Spring-security & amp; Configuration Spring-mvc

i have written a small webapp using spring-security and spring-mvc with an annotation based configuration (@Secured). in order to have that work i had to split up the spring-security configuration:...

View Article

Image may be NSFW.
Clik here to view.

NAVEX: Precise and scalable exploit generation for dynamic web applications

NAVEX: Precise and scalable exploit generation for dynamic web applications Alhuzali et al., USENIX Security 2018 NAVEX ( https://github.com/aalhuz/navex ) is a very powerful tool for finding...

View Article

Image may be NSFW.
Clik here to view.

绕过电子邮件格式过滤进行SQL注入

在此之前先给大家讲个冷笑话。这篇文章原文乍一看是英文的,但仔细一看我就懵了。没错!它并不是英文,而是印度尼西亚文。还好内容并不多,不然还不得吐血~ ―― 小编日常懵比 前不久,我加入了一家印度尼西亚金融科技公司的bug赏金计划。经过一番测试,我在“忘记密码”功能中找到了一个电子邮件输入框。依据经验,我开始尝试以下输入。 首先,我尝试了不带空格的输入: a@a.com=>有效 “a”@.com...

View Article


Worries Arise About Security of New WebAuthn Protocol

An anonymous reader writes: "A team of security researchers has raised the alarm about some cryptography-related issues with the newly released WebAuthn passwordless authentication protocol ," reports...

View Article


Five Ways to Make the Most of Mobile Biometrics

No longer the stuff of science fiction, or restricted to highly sensitive or military-grade applications, biometric authentication has become the de facto standard for mobile users―from unlocking your...

View Article

Slack Uses Autonomous Robots to Keep Their Office Safe

Slack announced during their annual Slack Frontiers conference that they had built two security robots in collaboration with Cobalt Robotics to watch over the company's office after humans end their...

View Article

PITS 2018: Secucloud participates in trade congress on IT and cybersecurity...

German security specialist will present innovative solution concept to the public sector Hamburg, Germany. 10 September 2018 Trust is the foundation to the e-government of the future. However,...

View Article

关键信息基础设施安全保护条例将出台,信息安全法制化加强

计算机行业表现回顾:上周,申万计算机行业指数上涨0.56%,同期沪深300指数下跌1.71%,计算机行业指数跑赢市场2.27个百分点。年初至上周最后一个交易日,申万计算机行业指数累计下跌9.24%,沪深300指数累计下跌18.69%,计算机行业指数累计跑赢市场9.45个百分点。...

View Article


Image may be NSFW.
Clik here to view.

VAVA Home Cam review: This crowd-funded camera delivers solid security

VAVA built its brand catering to the tech demands of modern lifestyles. While humidifiers, blenders, and other household items make up much of its product line, one of its greatest successes has been...

View Article

Image may be NSFW.
Clik here to view.

FireMon and KUBRA Partner to Deliver Secure Customer Experience Management...

OVERLAND PARK, Kan. & DALLAS (BUSINESS WIRE) #NSPM FireMon, a global leader in network security policy management, today announced a partnership with KUBRA to provide intelligent security...

View Article


Image may be NSFW.
Clik here to view.

Are BGPs security features working yet?

This post is a textual version of a talk I gave at NLNOG 2018, You can watch the talk below if that’s your preferred medium: BGP has had a problem for quite a while, most of the time when we hear about...

View Article

Image may be NSFW.
Clik here to view.

LIGMA Virus Removal Restore Infected Computers and .CRYPTR Files

The LIGMA virus is an original ransomware that can cause irreversible damage to the infected computers. It’s modules include an advanced protective engine that can counter any security tools installed...

View Article


Image may be NSFW.
Clik here to view.

One CISO’s Grand Experiment to Engage with Security Vendors

Last week, Allan Alford , CISO of Mitel , announced on LinkedIn that he was going to set aside two hours each week to have meetings with vendors. He expects that will result in about three to four...

View Article

Mac and iOS apps stealing user data, an enterprise take

Reports claiming numerous apps distributed through Apple’s App Store are secretly exfiltrating user data should be an alarm call to enterprise CIOs. It signals a new battlefront in the eternal...

View Article

Image may be NSFW.
Clik here to view.

What Boards and CEOs Should Be Asking CIOs

Boards and CEOs are more tech-savvy than they once were, but they still don't always know the best questions to ask CIOs. With the push for digital transformation they need to be armed with the right...

View Article
Browsing all 12749 articles
Browse latest View live