How Major Companies Find Leaks
Serious data leaks are increasingly prevalent in the news. We mostly hear about the immediate impact of those leaks and the steps taken to fix them, but how much do we actually know about how companies...
View ArticleThe Best of Shape Security 2018
“Hold on there, critics!” Photo Credit: Warner Brothers Focus on the Good Things There are already too many blogs focusing on the bad things that happened this year. Focusing on the bad things in life...
View ArticleTechnology Trends for the New Year That Are NOT About Security
As we inch closer to 2020, inquiring minds want to know … what’s next? What new tech devices and features can we expect to cause “disruption” as we move into 2019? Do you remember that positive feeling...
View ArticleLow-Code Development Is Awesome--Here’s When Not to Use It
Low-code development is one of the IT trends du jour, and for good reason. Low-code development platforms make it easier for anyone to write software quickly. They lower the barrier for programming...
View Article网络安全预测:2019年五大网络安全趋势展望
随着时间的流逝,2018年已经接近尾声,2019年即将到来,每当临近年末,大家都会结合以往的事件和经验对第二年的发展趋势进行简单的预测。那今天我们就来针对网络安全领域的发展,进行几点简单的预测(本文仅代表个人观点): 趋势一:网络安全相关法律法规将逐步完善...
View Article电信日:论道网络安全产业发展
互联网是一把双刃剑。人们在享受越来越智能化的物联网设备、移动设备等带来的便利的同时,也不得不面对“恶意黑客”的入侵破坏。 9月19日,由工业和信息化部指导、四川省通信管理局主办、中国信息通信研究院和中国通信企业协会联合承办的2018年国家网络安全宣传周“电信日”主题论坛在成都举办。各行业大咖齐聚一堂,就电信和互联网行业的网络安全等热点问题进行了交流。...
View Article35c3 junior CTF writeup
I visited the 35c3 again this year and for the first time decided to participate in the c3 CTF with three friends. We decided that the junior version is better suited for our skill level and managed...
View ArticleHow-To Assess System Images: Overview (Part 1)
Hey folks, happy new year. Today I wanted to go over how I do assessments on system images. I've been interested in this topic for a little over a year, and most of that experience has been on windows...
View ArticleMerlin: A cross-platform command and control server and agent written in Go
Merlin (BETA) Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. An introductory blog post can be found here:...
View ArticleTrump invites congressional leaders to border security briefing
By Amanda Becker and David Morgan WASHINGTON (Reuters) - President Donald Trump on Tuesday invited Republican and Democratic congressional leaders to a border security briefing at the White House as...
View Article用抢票软件背后的法律风险
原标题:用抢票软件背后的法律风险 距离2019年春节还有一个多月的时间,春运也进入了倒计时,能否顺利买到回家的火车票成了许多人最为关心的问题。为了省时省力,越来越多的乘客选择网上购票,各种抢票软件应运而生,人们为了顺利买到车票,往往不惜在抢票软件上多花钱,但是这些软件真的靠谱吗?法律对于抢票软件是如何界定的? 1 抢票软件是否合法...
View Article2019 security forecast: Cloudy and unsettled, with a chance of gloom
Back in April we asked 22 security experts whether we’re winning or losing the war against cybercriminals, and the consensus was almost unanimously negative. Not much has changed since then, and even...
View Article2018年网络安全大事记
一、信息泄露与网络攻击篇 1. 信息泄露连续五年创历史记录 自2013年斯诺登事件以来,全球信息泄露规模连年加剧。尽管目前还没有信息泄露统计的确切数字,但2018年的数据泄露规模又将创下新的历史记录已是大概率事件。根据Gemalto发布的《数据泄露水平指数(Breach Level...
View ArticleGamers Worry about the Future State of Gaming Security
McAfee Survey Finds Gamers Take Their Cybersecurity Seriously, However Actions Don’t Map Back to Concerns ADDITIONAL NEWS HIGHLIGHTS: Three-quarters of gamers worry about the security of gaming in the...
View Article盘点:2018年最受专业人士关注的20款安全工具
最近,Kitploit网站基于在2018年3月到12月期间的下载数据, 为我们总结了在2018年最受欢迎的20款黑客工具 。 对于从事信息安全工作的专业人士来说,使用与攻击者武器库中相同的工具,能够先于攻击者发现系统中存在的漏洞,并在这些漏洞遭到利用之前完成补丁开发工作。...
View ArticleWhy Managed Security Is Better For Business?
There is a widely held misconception that automation and AI are better in every context and that they can replace human expertise with ease in the years to come. This is not true! Agreed that...
View Article三重护航 徐州市第一人民医院构筑智慧医院建设高地
作为江苏省徐州市 “ 三重一大 ” 项目和 “ 民生幸福 ” 工程,总投资 20 多亿的徐州市第一人民医院新院区建设备受期待与关注。建成后的新院区不仅是徐州和整个淮海经济区占地面积最大、建筑面积最大的三级甲等综合医院,同时也将成为该地区 “ 智慧医院 ” 的最新样板与高地,为患者与民众提供从智慧医疗、全生命周期健康管理到养老的优质服务。...
View ArticleBest Practice Response Can Mitigate Data Breaches Quickly
It takes about six months for a company to detect that a data breach occurred in its system. During that time, hackers can do a lot of damage. So obviously you want to be able to mitigate the incident...
View ArticleUsing Crypto Anchors to Thwart Container Security Breaches
With new cyberattacks occurring week by week , security is now an extremely critical focus for all engineering teams. It’s also influencing the creation of new ways to prevent attacks. Crypto anchors...
View ArticleHow the Heartbleed Vulnerability Shaped OpenSSL as We Know It
Few are the bugs that truly make it into mainstream notoriety. Whether having to do with its unabashedly dramatic name and logo or with little relation, the Heartbleed vulnerability is one flaw that...
View Article