Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Fundamentals of Security: Why Is Asset Management Important?

We’re drawing on our security knowledge to provide a series on the fundamentals of securing devices and networks. The first item in our series was an introduction to how devices keep time, and which...

View Article



Image may be NSFW.
Clik here to view.

Day 04 little helper evenstrings

(This article was first published on r-bloggers STATWORX , and kindly contributed toR-bloggers) We at STATWORX work a lot with R and we often use the same little helper functions within our projects....

View Article

Image may be NSFW.
Clik here to view.

PbootCMS v1.3.2命令执行和SQL注入漏洞

0x00 前几天看到个PbootCMS,然后打算审计一波,网上找了这个cms之前的漏洞,看到有表哥审计过这个文章了, https://bbs.ichunqiu.com/forum.php?mod=viewthread&tid=45649&page=1#pid506915 ,可能别的表哥也发现了这个漏洞,这里简单说下我的思路。 0x01 命令执行漏洞...

View Article

Image may be NSFW.
Clik here to view.

What to Look for in a Data Protection Officer, and Do You Need One?

The hiring of a data protection officer is a key element of compliance with GDPR, but it's also an opportunity to differentiate your company. The 2018 deadline for compliance with the General Data...

View Article

Image may be NSFW.
Clik here to view.

AppSec Is Dead, but Software Security Is Alive & Well

Everyone agrees that an enterprise’s application ecosystem must be protected, especially when data breaches are reported with alarming frequency and the average total cost of a breach comes in at...

View Article


Image may be NSFW.
Clik here to view.

Getting More Money For Cybersecurity Budget: Why It’s Essential Now

Living in the city of Atlanta, we have seen first hand what happens when an organization is not aggressive in addressing known vulnerabilities within their infrastructure. In addition, the recent...

View Article

Image may be NSFW.
Clik here to view.

Netwrix Acquires Concept Searching to Expand Data Security Offerings

This acquisition will help Netwrix customers adopt a data-centric security approach and focus on protecting their most valuable assets Irvine, CA, December 4, 2018 ― Netwrix Corporation , provider of a...

View Article

Getting your Security Program to Shift Left: Operationalizing Security Controls

<Back to Blog Home Upcoming Webinar Details: The latest talk in managing security programs is the ability to make “shift left” in terms of implementing controls. This concept translates to being...

View Article


Image may be NSFW.
Clik here to view.

Respond Software Partners with ForeScout to Strengthen ICS Cybersecurity...

NASHUA, N.H. (BUSINESS WIRE) Respond Software teams up with ForeScout Technologies, Inc., a leading IoT security company, to roll out a new technical integration called Virtual ICS Threat Analyst Logic...

View Article


Image may be NSFW.
Clik here to view.

2018 Year in Review: Security and DevOps Talks from Salesforce

2018 Year in Review: Security and DevOps Talks from Salesforce Laura Lindeman We’ve had a great year on the conference circuit, with close to 100 Salesforce employees highlighting their work externally...

View Article

Image may be NSFW.
Clik here to view.

415,000 routers worldwide hijacked to secretly mine cryptocurrency

Researchers have discovered over 415,000 routers across the globe have been infected with malware designed to steal their computing power and secretly mine cryptocurrency. The attack, which is still...

View Article

Image may be NSFW.
Clik here to view.

Vereign Offers the Blockchain-Powered Solution for Email Security and...

Vereign adds authenticity and security to emails with a seamless plugin solution and identity management software ZUG, Switzerland (BUSINESS WIRE) #blockchain ― Vereign ( https://www.vereign.com/ ),...

View Article

扫码支付赎金勒索病毒被破解

扫码支付赎金勒索病毒被破解 腾讯电脑管家将提供解密工具和人工服务 北京晨报讯(记者...

View Article


Image may be NSFW.
Clik here to view.

Marriott Breach Encryption Exploited

Marriott Breach Encryption Exploited kdobieski Tue, 12/04/2018 09:12 And now Marriott reveals that intruder tactics included encrypting information from the hacked database, a move that is often used...

View Article

Image may be NSFW.
Clik here to view.

全同态加密的发展与应用

1976 年,Diffie 和 Hellman[DH76] 开创了公钥密码学,在密码学发展中具有划时代的意义。 不久,Rivest 等人 [RSA78] 提出第一个公钥加密 方案:RSA加密方案。Rivest等人[RAD78]随 后就指出 RSA 加密系统具有乘法同态性质:给定两个密文 C1=m18modN 和 C2=m28modN,通过计 算,c1c2 modN=(m1m2)8 modN,...

View Article


DHS, FBI Issue SamSam Advisory

Following last week's indictment, federal governments issues pointers for how security pros can combat the SamSam ransomware. The Department of Homeland Security (DHS) and the FBI issued an...

View Article

Image may be NSFW.
Clik here to view.

Salient Launches Powerful New Security Platform

The latest innovation for intelligent security, the Salient Security Platform, is a unified platform that is simple, scalable and secure with seamless migration services AUSTIN, Texas (BUSINESS WIRE)...

View Article


YouTube, Marriott Hack, and “Iceman” Hack Naked News #199

This week, hijacking printers to promote a YouTube channel, fake iOS apps that steal money, Google patches 11 critical RCE Android Vulnerabilities, Marriott hack hits 500 million Starwood guests, and...

View Article

1-800-Flowers Becomes Latest Payment Breach Victim

Those buying flowers for Mother’s Day or looking to send a plant for a birthday could find their thoughtful gestures reaping a crop of misery: Payment card data has been lifted from the Canadian online...

View Article

Clothing company OppoSuits hit by Magecart attack

Customers of Dutch clothing company OppoSuits have been warned to monitor their credit card accounts after the firm reported that malware planted on its website could have stolen the details of...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images