Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

PDO防sql注入原理分析

使用pdo的预处理方式可以避免sql注入。 在php手册中'PDO--预处理语句与存储过程'下的说明: 很多更成熟的数据库都支持预处理语句的概念。什么是预处理语句?可以把它看作是想要运行的 SQL 的一种编译过的模板,它可以使用变量参数进行定制。预处理语句可以带来两大好处:...

View Article



a list of bug bounty write-up that is categorized by the bug nature

Bug Bounty Reference A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty Introduction I have been reading for Bug...

View Article

Image may be NSFW.
Clik here to view.

Hot fuzz: Bug detectives whip up smarter version of classic AFL fuzzer to...

A group of university researchers from around the globe have teamed up to develop what they say is a powerful new tool to root out security flaws. Known as AFLSmart, this fuzzing software is built on...

View Article

Image may be NSFW.
Clik here to view.

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali linux , a...

View Article

Sophos 2019年威胁分析报告:勒索软件成领头羊

最近,网络安全公司Sophos发布了一个深度调研报告,对接下来2019年将出现的网络威胁向互联网用户和企业做出预警。下面是报告所提到的部分主要威胁: 勒索软件是“领头羊” 和传统“广撒网式”发送海量恶意邮件不同,这种勒索软件的攻击是“交互式”的,发布者不再是机器,其背后的人类攻击者会主动发掘和监测目标,并根据情况调整策略,受害者不交钱不罢休。...

View Article


Image may be NSFW.
Clik here to view.

国内资讯 防御DNS攻击成本报告:机构2018年平均损失71.5万美元

根据研究公司Coleman Parkes从全球1000家机构采样得来的数据,2018年间,77%的机构遭受了至少一次基于DNS的网络攻击。调查采样的企业,涵盖了活跃于通信、教育、金融、医疗保健、服务、运输、制造、公共、以及零售事业的组织机构。在全球范围五大基于DNS的攻击中,恶意软件和网络钓鱼占据了榜单前二的位置;而域名锁定、DNS隧道与DDoS攻击,也造成了极大的影响。...

View Article

Image may be NSFW.
Clik here to view.

Not A Security Boundary: Breaking Forest Trusts

For years Microsoft has stated that the forest was the security boundary in Active Directory. For example, Microsoft’s “ What Are Domains and Forests? ” document (last updated in 2014) has a “ Forests...

View Article

Image may be NSFW.
Clik here to view.

Making Your Subscriptions Safer with AzSK

AzSK ― Secure DevOps Kit for Azure, is a group of settings and scripts to analyze and improve the security of your Azure environments. It looks at six areas: Subscription Security, Security...

View Article


Ad fraud botnet 3ve shut down after infecting 1.7 million PCs

A massive team of security companies and federal agencies worked together to shut down an enormous click fraud operation. Although 3ve, pronounced Eve, started as a small botnet, by the time it was...

View Article


Image may be NSFW.
Clik here to view.

AWS Textract brings intelligence to OCR

One of the challenges just about every business faces is converting forms to a useful digital format. This has typicallyinvolved using human data entry clerks to enter the data into the computer. State...

View Article

As Data Breaches Surge, Companies Turn to Advanced Security Solutions

Granite Properties is not the sort of business that one usually thinks of as a prime target for hackers. The Plano, Texas-based commercial real estate firm doesn’t store or manage much personally...

View Article

Are STOs All They’re Cracked Up To Be?

Imagine being able to own.1% of a Picasso or a fourth of an Uber cab that you split with three of your friends. Currently, such things would be burdensome at best or just nearly impossible. However,...

View Article

Image may be NSFW.
Clik here to view.

Radware:利用安全扩大企业业务

谁来为我的设备和应用安全负责?在当今日益严峻的威胁形势下,这是一个重要问题,但也是一个没有明确答案的问题。尽管对移动应用以及连接设备安全特性的需求有所增加,但没有关键参与者会承担这个责任,包括设备制造商、消费者、移动运营商或消费者通过设备与其进行交易的企业。...

View Article


Image may be NSFW.
Clik here to view.

Sennheiser Headset Software Could Allow Man-In-the-Middle SSL Attacks

When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store. To make...

View Article

What is XSS?

What is XSS? Cross-site scripting or XSS is one of the most dangerous and malicious yet most widespread and common attacks that look to gain access to and control of the users’ browser by using...

View Article


Image may be NSFW.
Clik here to view.

Amazon Rolls Out AWS Security Hub

New security platform aggregates information from Amazon Web Services cloud accounts and third-party tools. Amazon today officially rolled out a new platform for monitoring and prioritizing security...

View Article

Image may be NSFW.
Clik here to view.

Data Breach Threats Bigger Than Ever

A quarter of IT and security leaders expect a major data breach in the next year. In its 2018 Strategic Security Survey (registration required), Dark Reading polled some 300 IT and security leaders and...

View Article


Image may be NSFW.
Clik here to view.

It's Time to Build a Cyber Panic Room

As destructive attacks flourish and counter-incident response becomes mainstream, organizations need to make a tactical paradigm shift from prevention to detection to suppression. Genghis Khan was a...

View Article

It's time for a new cyber risk management model

The cyber risk management model in its current form is broken. While cyber risk management is more important than ever for business executives, it’s more difficult for CISOs and cybersecurity teams to...

View Article

Image may be NSFW.
Clik here to view.

ThreatList: Cryptominers Dominate Malware Growth in 2018

The number of cryptomining attacks increased by more than 83 percent in the past year, with more than 5 million people attacked with the malware in the first three quarters of 2018. That’s compared to...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images