unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Google messes up: Office 365 login portal is not from Microsoft
«Office 365 login» With those words, many people start their workday to authenticate to Mic...
2022-10-3 22:49:20 | 阅读: 12 |
收藏
|
www.tarlogic.com
godaddy
microsoft
malicious
realm
NIS2: Strengthening the cybersecurity of the EU’s strategic sectors
1. NIS, a pioneering initiative that has fallen short of the mark1.1. Uneven implementation2....
2022-9-29 14:54:30 | 阅读: 24 |
收藏
|
www.tarlogic.com
nis2
security
directive
sectors
OWASP FSTM, stage 4: Extracting the filesystem
Many IoT devices run an embedded Linux operating system that can be found included in the firmwa...
2022-9-26 19:29:13 | 阅读: 22 |
收藏
|
www.tarlogic.com
firmware
entropy
squashfs
iotgoat
falling
Cyber insurance: A complement to security audits
1. Cyber insurance: Allies in dealing with the consequences of attacks2. What does cyber insur...
2022-9-22 15:5:31 | 阅读: 10 |
收藏
|
www.tarlogic.com
insurance
security
audits
companys
Cyber insurance: A complement to security audits
1. Cyber insurance: Allies in dealing with the consequences of attacks2. What does cyber insur...
2022-9-22 15:5:31 | 阅读: 17 |
收藏
|
www.tarlogic.com
insurance
security
audits
OWASP FSTM, stage 3: Analyzing firmware
Obtaining a raw binary dumpIntel HEXSREC or Motorola S-RecordHexdump or hexadecimal stringBase...
2022-9-19 18:36:39 | 阅读: 16 |
收藏
|
www.tarlogic.com
firmware
entropy
analysis
memory
binwalk
OWASP FSTM, stage 2: Obtaining IOT device firmware
Checking the operation of the deviceDownload firmware from the manufacturer’s websiteDownload...
2022-9-13 15:12:59 | 阅读: 42 |
收藏
|
www.tarlogic.com
firmware
uart
analysis
identify
OWASP FSTM, stage 1: Information gathering and reconnaissance
OWASP FSTM methodology sourcesSupported CPU architectureOperating system platformDisk/Bootload...
2022-9-8 15:16:29 | 阅读: 50 |
收藏
|
www.tarlogic.com
analysis
fstm
security
DORA Regulation: Can your bank withstand a cyber-attack?
1. ICT risk management: prevent, resist… and recover1.1. ICT risk management framework: from i...
2022-9-7 15:46:50 | 阅读: 16 |
收藏
|
www.tarlogic.com
ict
dora
regulation
tiber
Protecting apps, people, and businesses, the goal of Google MASA
1. Periodically evaluate mobile applications1.1. Contracting cybersecurity services1.2. OWASP:...
2022-9-1 15:12:13 | 阅读: 19 |
收藏
|
www.tarlogic.com
security
masa
developers
Google MASA: What are the security requirements for apps?
1. MASA, the framework that encompasses the Ms of security for mobile apps1.1. Google MASA Fra...
2022-8-2 18:27:9 | 阅读: 14 |
收藏
|
www.tarlogic.com
security
masa
masvs
mstg
remote
Google MASA: Assessing the security of apps available in the Play Store
1. App Defense Alliance: Ensuring Play Store security2. Google MASA. A three-level security as...
2022-7-27 23:56:30 | 阅读: 12 |
收藏
|
www.tarlogic.com
security
masa
developers
evaluation
initiative
How to use the NIST Cybersecurity Framework to combat ransomware attacks
1. Basic tips to reduce the risks of ransomware1.1. Educate the workforce1.2. Avoiding vulnera...
2022-7-19 22:20:15 | 阅读: 15 |
收藏
|
www.tarlogic.com
ransomware
security
combat
NIST Cybersecurity Framework: A compass for navigating the ocean of cyber risks
1. A common language2. The core of the NIST cybersecurity framework2.1. Core elements2.2. Conc...
2022-7-13 16:30:38 | 阅读: 15 |
收藏
|
www.tarlogic.com
security
objectives
processes
If you trade in the Ethereum blockchain, you will lose your money. Here is why
Scope of the analysisCrypto tradersCopy tradingEthereum trader identificationEthereum trade Si...
2022-7-5 14:59:42 | 阅读: 11 |
收藏
|
www.tarlogic.com
traders
profit
blockchain
analysis
trader
Demystifying Zero Trust
1. «Zero Trust is not a state, it is a philosophy»1.1. The path of zero trust1.2. AI, metavers...
2022-6-29 15:53:54 | 阅读: 11 |
收藏
|
www.tarlogic.com
security
principles
philosophy
malicious
Tracking Ethereum blockchain attackers: Measuring sandwich attacks
There are malicious actors perpetrating attacks in the Ethereum blockchain. However, due to its...
2022-6-17 15:50:12 | 阅读: 13 |
收藏
|
www.tarlogic.com
profit
sandwich
blockchain
profits
attacker
NIST Guidelines: a methodological underpinning for cybersecurity analysts
1. What are NIST guidelines?2. NIST 800-115: Technical Guide for Information Security Testing...
2022-6-14 21:23:37 | 阅读: 23 |
收藏
|
www.tarlogic.com
security
network
guidelines
analysis
CVE-2022-26134. Zero Day vulnerability affecting Atlassian Confluence
Products affected by vulnerability CVE-2022-26134CVE-2022-26134 Workarounds and security patch...
2022-6-3 22:48:51 | 阅读: 21 |
收藏
|
www.tarlogic.com
atlassian
26134
webwork
xwork
security
PLCTool plugin support
The newly implemented plugin support of PLCTool allows for the addition of new functionalities...
2022-6-3 20:43:49 | 阅读: 31 |
收藏
|
www.tarlogic.com
plctool
dlms
network
library
Previous
5
6
7
8
9
10
11
12
Next