- 博客(4233)
- 资源 (2)
- 收藏
- 关注
原创 cygraph
http://neo4j.com/blog/cygraph-cybersecurity-situational-awareness/
2015-10-17 22:50:49 852
原创 top 9 fraud attacks
https://www.cybersource.com/content/dam/cybersource/CyberSource_MRC_Survey_Top_9_Fraud_Attacks.pdf
2015-10-16 22:22:02 615
原创 fireeye的可见度威胁情报
https://www.fireeye.com/company/press-releases/2015/10/fireeye-redefines-threat-detection-again-with-cutting-edge-innov.html
2015-10-12 23:17:01 1282
原创 BruCON 0x07 - Unified DNS View to Track Threats - Dhia Mahjoub & Thomas Mathew
https://www.youtube.com/watch?v=8edBgoHXnwg
2015-10-12 23:08:01 4124
原创 Best Practices for AWS Security Using CloudCheckr
https://www.youtube.com/watch?v=6BGNBWpNeu0https://www.youtube.com/watch?v=rei30obkaBc
2015-10-10 21:17:56 548
原创 Magic Quadrant for Security Information and Event Management 2015
http://www.gartner.com/technology/reprints.do?id=1-2J31FF4&ct=150706&st=sb
2015-10-07 19:29:19 683
原创 Log Malicious Discovery tool (Log-MD)
http://malwarearchaeology.squarespace.com/log-md/
2015-10-06 17:19:41 541
原创 MITRE OpenSource Tools
http://www.mitre.org/research/technology-transfer/open-source-software?page=1
2015-09-30 18:23:53 665
原创 Threat Intelligence videos
https://www.brighttalk.com/search?q=Threat+Intelligence
2015-09-27 17:07:41 572
原创 安全小创意
http://www.ichunqiu.com/section/360看到这个视频之后我觉得把我的小破车测试一把,看看能不能黑掉。这个体会就是创意来源于生活。
2015-09-17 22:13:02 1015
原创 BDFProxy
https://hackmag.com/security/bdfproxy/https://github.com/secretsquirrel/BDFProxy
2015-09-17 20:10:02 2284
原创 Multi-host, Multi-stage Vulnerability Analysis Language
http://people.cis.ksu.edu/~xou/mulval/
2015-09-13 10:19:41 829
原创 攻击树分析
Threat ModelingJohn Howard, Thomas Longstaff; “A Common Language for Computer Security Incidents”; Sandia National Laboratories; October 1998. DOI= http://prod.sandia.gov/techlib/access-control.cg
2015-09-12 22:17:31 2549
原创 "棱X门"涉及的各种公司以及项目(长期更新)
1. Palantirhttps://www.palantir.com/2. 投资公司IQThttps://www.iqt.org/3,Abraxashttp://www.abraxascorp.com/4, SGIShttp://www.afcea.org/content/?q=sgis-receives-intelligence-
2015-09-12 19:22:09 1143
原创 威胁情报提供的服务
1. 黑客或欺诈者社区渗透2. 社交媒体开源监控3. 有针对性的漏洞研究4.深度、定制化人工分析5.Feeds(hashes, blacklists, Internet Protocol [IP]/URL reputation, malware indicators, behavioral profiles of threat actors)6.网络活动portal7.实时
2015-09-11 18:45:08 1434
原创 Panopticlick揭示你不能删除cookie
Panopticlickhttps://nakedsecurity.sophos.com/zh/2014/07/28/panopticlick-reveals-the-cookie-you-cant-delete/
2015-09-05 16:49:30 880
原创 Leveraging Big Data Technologies to Build a Common Repository for Security
http://www.oreilly.com/data/free/files/security-data-lake.pdf
2015-09-04 21:11:58 679
原创 Velocity Conference Santa Clara 2015: Complete Video Compilation
https://player.oreilly.com/videos/9781491927977?toc_id=215840
2015-09-04 21:11:01 622
原创 Active Defense Harbinger Distribution
http://sourceforge.net/projects/adhd/
2015-09-04 16:12:37 667
原创 被动DNS
dnstap.infodnsdb.infoapi.dnsdb.infogithub.com/farsightsecdnsrpz.info
2015-09-04 09:54:47 1924
原创 amazon近期出版的书
http://www.amazon.com/Windows-Malware-Analysis-Essentials-Victor-ebook/dp/B014HFNB36/ref=sr_1_260?s=books&ie=UTF8&qid=1441267574&sr=1-260
2015-09-03 16:08:58 644
转载 Sandbox Evasion with COM by Malware in-the-Wild
http://www.vmray.com/sandbox-evasion-with-com-by-malware-in-the-wild/
2015-09-03 15:40:08 633
转载 探寻社交网络中的关系: 统计网络模型初探
http://chengjun.github.io/cn/2013/08/sna-book-chapter/
2015-09-03 13:07:47 1111
原创 WSUS pentest white paper
http://www.contextis.com/media/documents/CTX_WSUSpect_White_Paper.pdf
2015-08-27 23:46:21 610
转载 Audit Policy Recommendations
https://technet.microsoft.com/en-us/library/dn487457.aspx
2015-08-25 23:34:51 574
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人