Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Hack the Box: Active Walkthrough

Today we are going to solve another CTF challenge “Active”. Active is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...

View Article


Voice of the Customer: The Walsh Group found that Azure Active Directory...

Todays post was written by Sue Bohn, partner director of Program Management, and Peter Vallianatos and Phillip Nottoli, directors of IT Infrastructure and Security at The Walsh Group. Hello! This is...

View Article

Image may be NSFW.
Clik here to view.

8 must-have features in an IAST solution

With so many vendors to choose from, finding the perfect IAST solution for your organization’s needs can be difficult. Here’s a checklist of 8 must-have features for any good IAST tool. Many are...

View Article

Image may be NSFW.
Clik here to view.

New NIST TLS Management Guidelines for InfoSec [Expert Advice]

New NIST TLS Management Guidelines for InfoSec [Expert Advice] kdobieski Tue, 12/11/2018 09:05 Here’s the list of TLS certificate-related risks I included in a recent post for executives: Application...

View Article

NetSecOPEN Names Founding Members, Board of Directors

The organization is charged with building open, transparent testing protocols for network security. NetSecOPEN, an organization charged with creating open network security testing standards, has taken...

View Article


Adobe December 2018 Security Update Fixes Reader, Acrobat

Adobe has patched 88 vulnerabilities for Acrobat and Reader in its December Patch Tuesday update, including a slew of critical flaws that would allow arbitrary code-execution. The scheduled update...

View Article

Image may be NSFW.
Clik here to view.

SAP Security Notes December ‘18: High Priority Missing Authorization Check...

Today, on SAP’s Security Patch Day, the company published 17 security notes , including a few that had been published during the month after the last Patch Day. Two notes tagged as Hot News and three...

View Article

Equifax Breach Underscores Need for Accountability, Simpler Architectures

A new congressional report says the credit reporting firm's September 2017 breach was 'entirely preventable.' Equifax could have prevented a breach of its systems and the resulting leak of sensitive...

View Article


Sky and Space inks reseller deal with India’s Global Teleservices

Australian-listed, UK-based satellite communications company Sky and Space Global has signed a reseller Memorandum of Understanding with Indian based international telecom services provider Globe...

View Article


Image may be NSFW.
Clik here to view.

From Research to Use-Case: How 8 Decimal Capital Strategically Constructs Its...

From Research to Use-Case: How 8 Decimal Capital Strategically Constructs Its Security Token Landscape 8 Decimal Capital 8 Decimal Capital Overview: The evolution of digital tokens has coincided with a...

View Article

Image may be NSFW.
Clik here to view.

物联网是不系安全带上路的吗?

物联网在安全性方面进展缓慢,使得用户隐私和人身安全一直受到威胁。在过去的几年里,物联网的安全问题获得了较大的关注,但大多数都是讨论消费者应该如何做来保障安全。问题是,企业是可以比消费者做的更多来提高安全性的。此外,消费者似乎对如何保护自己并不那么感兴趣。 物联网提供商应汲取历史经验...

View Article

Image may be NSFW.
Clik here to view.

如何通过iptables设置来缓解DDoS攻击和CC攻击?

最近这几年,互联网高速发展的同时,网络安全威胁也日益严重。很多互联网公司经常会遭到各种各样的网络攻击,特别是DDOS攻击最让互联网企业感到头痛,因为DDOS攻击会直接造成服务器崩溃,导致用户无法访问,业务直接中断。而且DDOS攻击是利用TCP协议漏洞,根本无法完全避免,只能被动做好防御,防御的成本还比较高。今天墨者安全通过多年的一些高防经验,来分享一下当站点受到DDoS攻击和CC攻击时,如何通过ip...

View Article

Image may be NSFW.
Clik here to view.

Deconstructing Data Leak incident of Signet Jewelers (parent company of Kay...

Credits: MichealHill Note: The following series of deconstruction/post-mortem is indicative of the security issues similar to the one found in Signet Jewelers infrastructure and first reported by...

View Article


Image may be NSFW.
Clik here to view.

Android trojan steals from PayPal app even with 2FA on

Slovakian security firm ESET says it has discovered a new Android trojan that has the capabilities of remotely connected malware with misuse of Android Accessibility services to target PayPal app...

View Article

That PayPal Trojan story is stupid and a waste of everyone's time

Security theater That PayPal Trojan story is stupid and a waste of everyone's time Another mostly pointless Android security scare that probably doesn't apply to you or anyone you know. Russell Holly...

View Article


Image may be NSFW.
Clik here to view.

Using ggplot2 for functional time series

(This article was first published on R on Rob J Hyndman , and kindly contributed toR-bloggers) This week I’ve been attending the Functional Data and Beyond workshop at the Matrix centre in Creswick. I...

View Article

Image may be NSFW.
Clik here to view.

300多款APP受“寄生推”病毒感染,腾讯手机管家精准防御

原标题:300多款APP受“寄生推”病毒感染,腾讯手机管家精准防御 近年来,木马病毒感染事件频繁发生,给用户的日常生活带来一定程度的损害。近日,腾讯安全联合实验室反诈骗实验室自研的TRP-AI反病毒引擎捕获到一个恶意推送信息的SDK――“寄生推”SDK。此前曾有用户下载了一款知名软件,结果手机开始不断弹出恶意弹窗,而这很有可能是因为该软件被植入了“寄生推”SDK。...

View Article


Battling Bots Brings Big-Budget Blow to Businesses

Fighting off bot attacks on Web applications extracts a heavy cost in human resources and technology, according to a just-released report. A new report carries the unsurprising news that battling...

View Article

Super Micro says audit found no trace of Chinese spy chips on its boards

hardware builder Super Micro has delivered another effort to prove to the public its machines were not bugged by the Chinese government. The US-based company on Tuesday issued the findings of an...

View Article

Image may be NSFW.
Clik here to view.

卡巴斯基:2018年度安全大事件盘点

一、概述...

View Article
Browsing all 12749 articles
Browse latest View live