DKIM.pdf
1.5 MB
#Research
"A Large-scale and Longitudinal Measurement Study of DKIM Deployment", ВUSENIX Security, 2022.
📰
📚
⌨
"A Large-scale and Longitudinal Measurement Study of DKIM Deployment", ВUSENIX Security, 2022.
📰
📚
⌨
TG1021 - Praying Mantis Threat Actor (2021).pdf
797.2 KB
#Research
"HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations", IEEE/IFIP 2022.
]-> Repo: https://github.com/mo-xiaoxi/HDiff
📰
📚
"HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations", IEEE/IFIP 2022.
]-> Repo: https://github.com/mo-xiaoxi/HDiff
📰
📚
NIST_SP_800_219.pdf
2.3 MB
#Infosec_Standards
NIST SP 800-219:
"Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)", June 2022.
📰
📚
NIST SP 800-219:
"Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)", June 2022.
📰
📚
backdoor_ssl.pdf
2 MB
#Research
"Backdoor Attacks on Self-Supervised Learning", 2022.
]-> Repo: https://github.com/UMBCvision/SSL-Backdoor
📰
📚
"Backdoor Attacks on Self-Supervised Learning", 2022.
]-> Repo: https://github.com/UMBCvision/SSL-Backdoor
📰
📚
LS 0622-096 ATM Skimming-GLBA Incident @Offensive01.pdf
297 KB
LS 0622-096 #ATM Skimming-GLBA Incident
As you are likely aware, your Bank of the West debit card(s) may have been compromised as a result of
fraudulent activities involving an ATM. We regret this unfortunate incident.
📰
📚
As you are likely aware, your Bank of the West debit card(s) may have been compromised as a result of
fraudulent activities involving an ATM. We regret this unfortunate incident.
📰
📚
10_Ways_to_Improve_AD_Security.pdf
3.1 MB
#hardening
#Blue_Team
"Top 10 Ways to Improve Active Directory Security Quickly", 2022.
]-> https://www.hub.trimarcsecurity.com/post/webcast-top-10-ways-to-improve-active-directory-security-quickly
📰
📚
#Blue_Team
"Top 10 Ways to Improve Active Directory Security Quickly", 2022.
]-> https://www.hub.trimarcsecurity.com/post/webcast-top-10-ways-to-improve-active-directory-security-quickly
📰
📚
Win_Exploitation_Attacking.pdf
1.4 MB
#Threat_Research
Black Hat Asia 2022:
"The Next Generation of Windows Exploitation: Attacking the Common Log File System", 2022.
📰
📚
Black Hat Asia 2022:
"The Next Generation of Windows Exploitation: Attacking the Common Log File System", 2022.
📰
📚
Evasion_Tactics.pdf
5.8 MB
#Red_Team_Tactics
"Modern Initial Access and Evasion Tactics"
]-> https://mgeeky.tech/warcon-2022-modern-initial-access-and-evasion-tactics
📰
📚
"Modern Initial Access and Evasion Tactics"
]-> https://mgeeky.tech/warcon-2022-modern-initial-access-and-evasion-tactics
📰
📚
Sponge_Examples.pdf
3 MB
#Research
"Sponge Examples: Energy Latency Attacks on Neural Networks", 2021.
]-> Repo: https://github.com/iliaishacked/sponge_examples
📰
📚
"Sponge Examples: Energy Latency Attacks on Neural Networks", 2021.
]-> Repo: https://github.com/iliaishacked/sponge_examples
📰
📚
DevOps_Handbook.pdf
10.6 MB
#Tech_book
"The DevOps Career Handbook:
The ultimate guide to pursuing a successful career in DevOps", 2022.
📰
📚
"The DevOps Career Handbook:
The ultimate guide to pursuing a successful career in DevOps", 2022.
📰
📚