CyberWar Map : A visual guide to some of the most prominent players and events in state-to-state cyberconflict created as a part of the National Security Archive's Cyber Vault Project.
https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index
"AI and Machine Learning for Cyber Security Wiki [The Biggest on the Internet]" by @chihebchebbi201 on @Peerlyst https://www.peerlyst.com/posts/ai-and-machine-learning-for-cyber-security-wiki-the-biggest-on-the-internet-chiheb-chebbi?utm_source=twitter&utm_medium=Application_Share&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
Tips for an Information Security Analyst/Pentester career - An overview of the series
An Intro to x86_64 Reverse Engineering
https://leotindall.com/tutorial/an-intro-to-x86_64-reverse-engineering/
Analyzing WebAssembly binaries https://shar.es/anTUm0
Event Injection: A New Serverless Attack Vector https://www.jeremydaly.com/event-injection-a-new-serverless-attack-vector/
Playing with Relayed Credentials - Core Security
https://www.coresecurity.com/blog/playing-relayed-credentials
Rampage Attacks - Vulnerabilities in modern phones enable unauthorized access : http://rampageattack.com/ , GuardION : Practical Mitigation of DMA-basedRowhammer Attacks on ARM
https://vvdveen.com/publications/dimva2018.pdf
Outside the Green Bubble of China’s Super-App
CyberWar Map : A visual guide to some of the most prominent players and events in state-to-state cyberconflict created as a part of the National Security Archive's Cyber Vault Project.
https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index
The NSA’s hidden spy hubs in eight U.S. cities
高级持续威胁组
Advanced Persistent Threat Groups
Who's who of cyber threat actors
[@FireEye ]
Meltdown: Reading Kernel Memory from User Space
https://www.usenix.org/conference/usenixsecurity18/presentation/lipp
4 Ways to Capture NTLM Hashes in Network http://www.hackingarticles.in/4-ways-capture-ntlm-hashes-network/
Technitium Blog: Configuring DNS Server For Privacy & Security
http://blog.technitium.com/2018/06/configuring-dns-server-for-privacy.html?spref=tw
CERT Tapioca是一款用于使用MITM技术测试移动设备或任何其他应用程序的实用程序。CERT木薯开发由美国陆军装备研究开发与工程中心(ARDEC)以及美国国土安全部(DHS)主办
Meet MyloBot - A New Highly Sophisticated Never-Seen-Before Botnet That's Out In The Wild - Deep Instinct https://www.deepinstinct.com/2018/06/20/meet-mylobot-a-new-highly-sophisticated-never-seen-before-botnet-thats-out-in-the-wild/#.Wyq5M_MStc0.twitter
I discovered a browser bug http://disq.us/t/33ixt4x
“Attacking Private Networks from the Internet with DNS Rebinding” by @brannondorsey https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325
"Cyber forensics and incident response study plan" by Karl M. on @Peerlyst https://www.peerlyst.com/posts/cyber-forensics-and-incident-response-study-plan-karl-m-1?utm_source=twitter&utm_medium=Application_Share&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post