Finding Interactive User COM Objects using PowerShell
Easily one of the most interesting blogs on windows behaviour is Raymond Chen's The Old New Thing . I noticed he'd recently posted about using "Interactive User" (IU) COM objects to go from an...
View ArticleBSides Idaho Falls Preview: The Industrialization of Red and Blue Teaming
When we think of industrialization and the industrial revolution, images of smoke stacks, purpose-built machinery, and automation come to mind. Some examples are the Jacquard Machine, as pictured...
View Article漏洞治理平台的设计与实现
几个月前笔者曾经梳理过技术方面的漏洞处理的心得,经过几个月的实践和迭代,我们在公司内推出了漏洞治理的概念,并进行实践中。本文就漏洞治理体系的设计和实现的各个环节做个详细的阐述。 适用场景: 业务系统逻辑复杂,部门间关系较复杂,对网络安全敏感性高的环境。(当然内部环境简单的企业也可以采用,但会感觉方案太重) 整体架构: 整体架构从 资产发现 开始,第二个阶段是 漏洞扫描 ,第三个阶段是 漏洞处理...
View Article去中心化到底为什么重要?我们应该怎么理解去中心化?
前言:去中心化是区块链的一个属性,但也是被普遍误解的一个属性。去中心化到底为什么重要?我们应该怎么理解去中心化?从宏观的角度,作者Chris Dixon做出了很好的阐释,值得细读。本文源于Cdixon.org,由蓝狐笔记社群“Anthony”翻译。 Web1.0 & Web 2.0 互联网web 1.0 - 从20世纪80年代到21世纪初-...
View ArticleSpring-security & amp; Configuration Spring-mvc
i have written a small webapp using spring-security and spring-mvc with an annotation based configuration (@Secured). in order to have that work i had to split up the spring-security configuration:...
View ArticleNAVEX: Precise and scalable exploit generation for dynamic web applications
NAVEX: Precise and scalable exploit generation for dynamic web applications Alhuzali et al., USENIX Security 2018 NAVEX ( https://github.com/aalhuz/navex ) is a very powerful tool for finding...
View Article绕过电子邮件格式过滤进行SQL注入
在此之前先给大家讲个冷笑话。这篇文章原文乍一看是英文的,但仔细一看我就懵了。没错!它并不是英文,而是印度尼西亚文。还好内容并不多,不然还不得吐血~ ―― 小编日常懵比 前不久,我加入了一家印度尼西亚金融科技公司的bug赏金计划。经过一番测试,我在“忘记密码”功能中找到了一个电子邮件输入框。依据经验,我开始尝试以下输入。 首先,我尝试了不带空格的输入: a@a.com=>有效 “a”@.com...
View ArticleWorries Arise About Security of New WebAuthn Protocol
An anonymous reader writes: "A team of security researchers has raised the alarm about some cryptography-related issues with the newly released WebAuthn passwordless authentication protocol ," reports...
View ArticleFive Ways to Make the Most of Mobile Biometrics
No longer the stuff of science fiction, or restricted to highly sensitive or military-grade applications, biometric authentication has become the de facto standard for mobile users―from unlocking your...
View ArticleSlack Uses Autonomous Robots to Keep Their Office Safe
Slack announced during their annual Slack Frontiers conference that they had built two security robots in collaboration with Cobalt Robotics to watch over the company's office after humans end their...
View ArticlePITS 2018: Secucloud participates in trade congress on IT and cybersecurity...
German security specialist will present innovative solution concept to the public sector Hamburg, Germany. 10 September 2018 Trust is the foundation to the e-government of the future. However,...
View Article关键信息基础设施安全保护条例将出台,信息安全法制化加强
计算机行业表现回顾:上周,申万计算机行业指数上涨0.56%,同期沪深300指数下跌1.71%,计算机行业指数跑赢市场2.27个百分点。年初至上周最后一个交易日,申万计算机行业指数累计下跌9.24%,沪深300指数累计下跌18.69%,计算机行业指数累计跑赢市场9.45个百分点。...
View ArticleVAVA Home Cam review: This crowd-funded camera delivers solid security
VAVA built its brand catering to the tech demands of modern lifestyles. While humidifiers, blenders, and other household items make up much of its product line, one of its greatest successes has been...
View ArticleFireMon and KUBRA Partner to Deliver Secure Customer Experience Management...
OVERLAND PARK, Kan. & DALLAS (BUSINESS WIRE) #NSPM FireMon, a global leader in network security policy management, today announced a partnership with KUBRA to provide intelligent security...
View ArticleAre BGPs security features working yet?
This post is a textual version of a talk I gave at NLNOG 2018, You can watch the talk below if that’s your preferred medium: BGP has had a problem for quite a while, most of the time when we hear about...
View ArticleLIGMA Virus Removal Restore Infected Computers and .CRYPTR Files
The LIGMA virus is an original ransomware that can cause irreversible damage to the infected computers. It’s modules include an advanced protective engine that can counter any security tools installed...
View ArticleOne CISO’s Grand Experiment to Engage with Security Vendors
Last week, Allan Alford , CISO of Mitel , announced on LinkedIn that he was going to set aside two hours each week to have meetings with vendors. He expects that will result in about three to four...
View ArticleMac and iOS apps stealing user data, an enterprise take
Reports claiming numerous apps distributed through Apple’s App Store are secretly exfiltrating user data should be an alarm call to enterprise CIOs. It signals a new battlefront in the eternal...
View ArticleWhat Boards and CEOs Should Be Asking CIOs
Boards and CEOs are more tech-savvy than they once were, but they still don't always know the best questions to ask CIOs. With the push for digital transformation they need to be armed with the right...
View Article