Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Fundamentals of Device Security: Where Are Your Devices Getting Their Time?

We’re drawing on our security knowledge to provide a series on the fundamentals of securing devices and networks. First up is an introduction to how devices keep time, and what best practices ensure...

View Article



Image may be NSFW.
Clik here to view.

19 Year-old from York Declared 2018 Cyber Security Challenge Winner

Add to favorites “Until you have lived through a real-life cyber threat, or worse, an attack, it can be difficult to know what to expect and exactly how that might look” Charlie Hosier a nineteen...

View Article

Image may be NSFW.
Clik here to view.

How Should I Dispose of My Old Electronics (That May Have Passwords In Them)?

Recycling is good. I even wrote about recycling your devices a couple of years ago. Just recently the US Computer Emergency Readiness Team or US-CERT (part of the US Department of Homeland Security...

View Article

PureSec: The Most Dangerous Current Security Risks to Serverless

Overprivileged function permissions and event data injection are among two of the biggest security threats to serverless environments, according to a list of the top 10 serverless security threats ,...

View Article

Image may be NSFW.
Clik here to view.

Alert Logic Achieves Amazon Web Services Container Security Competency Status

Network IDS and Log Management for Containers Earns AWS Competency Status for New Levels of Visibility, Portability, and Threat Detection LAS VEGAS (BUSINESS WIRE) Alert , the SIEMless Threat...

View Article


Australia needs 18,000 more cyber security professionals by 2026 to capture...

Australia needs around 18,000 more cyber security professionals by 2026 if the sector is to be globally competitive, a new report has found. The report from AustCyber, a 2018 update to its Sector...

View Article

Image may be NSFW.
Clik here to view.

The New Protecting Telephone-Based Payment Card Data Guidance

By Wayne Murphy, Senior Security Consultant, Sec-1 Ltd. This week saw the eagerly awaited update to the “ Protecting Telephone-based Payment Card Data Guidance ” by the Payment Card Industry Security...

View Article

SEC Chair Clayton: Crypto ETF Needs Exchanges ‘Free From Manipulation’

Jay Clayton, chairman of the U.S. Securities and Exchange Commission (SEC), said Tuesday that he doesn’t see a pathway to a cryptocurrency ETF approval until concerns over market manipulation are...

View Article


Threat Actor Uses DNS Redirects, DNSpionage RAT to Attack Government Targets

Cisco Talos discovered a new malware campaign targeting a commercial Lebanese airline company, as well as United Arab Emirates (UAE) andLebanon government domains. According to Cisco Talos' findings ,...

View Article


Image may be NSFW.
Clik here to view.

From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt

While I’ve written a lot of code in my time, I don’t think I’ve ever firmly appreciated how complex it can be to write secure code. We go about our lives taking for granted that our apps will just...

View Article

Image may be NSFW.
Clik here to view.

Who's the Weakest Link in Your Supply Chain?

Nearly 60% of organizations have suffered data breaches resulting from a third party, as suppliers pose a growing risk to enterprise security. Do you know how many third parties your organization works...

View Article

New campaign targets Lebanese and UAE government sites

A campaign that targets government domains in Lebanon and the United Arab Emirates, as well as the private Lebanese airline, Middle East Airlines, has been uncovered by Cisco's Talos Intelligence...

View Article

New Hacker Group Behind 'DNSpionage' Attacks in Middle East

Motives are not fully clear, though data exfiltration is one possibility, Cisco Talos says. Looks like you've hit your article limit. Pleaseor register for a free account to get unlimited access to...

View Article


Fileless Backdoored Trojan Spreads Using Worm Living in Removable Drives

A windows worm propagating through removable drives has been observed by Trend Micro spreading theBLADABINDI Trojan with backdoor , DDoS and RAT capabilities. The BLADABINDI Trojan has been used in...

View Article

Image may be NSFW.
Clik here to view.

卡巴斯基实验室预测区块链和加密货币在2019年不会出现真正的增长

加密货币用户受到许多不同类型的外部威胁。比特币和替代币的匿名性往往会吸引犯罪活动。卡巴斯基实验室的一份新报告证实,2019年将出现新的威胁。现在轮到加密货币用户采取足够的安全防范措施了。 2018年卡巴斯基实验室的预测成为现实...

View Article


Image may be NSFW.
Clik here to view.

Responding Quickly: Law Enforcement and Secure Communications

In emergency situations, speed is key for first responders. Law enforcement agencies need to have the tools in place to be able to communicate and coordinate quickly. Using old and clunky tools―like...

View Article

Security’s Case Against ‘Cloud-Native DevOps’

The whole point of the movement-within-a-movement that Utsav Sanghani , senior product manager for desktop and AppDev security for code security platform provider Synopsys , calls “DevSecOps,” is to...

View Article


Image may be NSFW.
Clik here to view.

捕获一起恶意入侵事件的攻击溯源

0×0 背景 近日,深信服安全团队接到客户本地的安全感知报警,提示有恶意的CC访问连接报警,访问恶意域名down.mys2018.xyz达到了1057次、访问my2018.zxy达到了490次主机直接被标记为了已失陷,经过较多的杀毒软件查杀均未查杀出异常,后续经过相关的排查发现服务器存在较大的安全隐患,与Myking团伙有较大的关联。 0×1 总体情况...

View Article

Image may be NSFW.
Clik here to view.

京东回应裁员:系造谣,已报案;曝Uber与黑客“私了”销毁数据泄漏证据;苹果大规模下 ...

京东回应裁员风波:正常人员流动被造谣,已报案 11月27日,网络流传京东将裁员10%,更有网上截图显示,不同的部门按比例裁员,京东商城10%起步,京东金融15%的淘汰率。此外,还流传京东拟先裁未婚未育女性、试用期的新人作为裁员备份。...

View Article

Aqua Security Achieves AWS Container Competency Status

Establishes Aqua as having specialized technical proficiency and proven customer success in securing container workloads on AWS BOSTON 27 Nov. 2018 Aqua Security , a leading platform provider for...

View Article
Browsing all 12749 articles
Browse latest View live


Latest Images